[INFO] fetching crate good_memory_allocator 0.1.7...
[INFO] checking good_memory_allocator-0.1.7 against master#3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777 for pr-132289
[INFO] extracting crate good_memory_allocator 0.1.7 into /workspace/builds/worker-3-tc1/source
[INFO] validating manifest of crates.io crate good_memory_allocator 0.1.7 on toolchain 3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate good_memory_allocator 0.1.7
[INFO] finished tweaking crates.io crate good_memory_allocator 0.1.7
[INFO] tweaked toml for crates.io crate good_memory_allocator 0.1.7 written to /workspace/builds/worker-3-tc1/source/Cargo.toml
[INFO] crate crates.io crate good_memory_allocator 0.1.7 already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded spinning_top v0.2.4
[INFO] [stderr]   Downloaded simple-chunk-allocator v0.1.5
[INFO] [stderr]   Downloaded linked_list_allocator v0.10.3
[INFO] [stderr]   Downloaded easy-cast v0.4.4
[INFO] [stderr]   Downloaded average v0.13.1
[INFO] [stderr]   Downloaded spin v0.9.4
[INFO] [stderr]   Downloaded raw-cpuid v10.6.0
[INFO] [stderr]   Downloaded x86 v0.51.0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4a844ea9eb2546a2d2c7022eacef16ef2e8229c7fbb2c7d4d55a9ceca922f72d" "/opt/rustwide/cargo-home/bin/cargo" "+3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 77c127a89ab8b4240f6620dba3d49f99dbf5db58b3f5d73b86bc6823775f4aae
[INFO] running `Command { std: "docker" "start" "-a" "77c127a89ab8b4240f6620dba3d49f99dbf5db58b3f5d73b86bc6823775f4aae", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "77c127a89ab8b4240f6620dba3d49f99dbf5db58b3f5d73b86bc6823775f4aae", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "77c127a89ab8b4240f6620dba3d49f99dbf5db58b3f5d73b86bc6823775f4aae", kill_on_drop: false }`
[INFO] [stdout] 77c127a89ab8b4240f6620dba3d49f99dbf5db58b3f5d73b86bc6823775f4aae
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:4a844ea9eb2546a2d2c7022eacef16ef2e8229c7fbb2c7d4d55a9ceca922f72d" "/opt/rustwide/cargo-home/bin/cargo" "+3f1be1ec7ec3d8e80beb381ee82164a0aa3ca777" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] b928140efa5f49a0a37ada04fbcaa83d5ea9ef8ed1bf17c1dc8505cb81aa8938
[INFO] running `Command { std: "docker" "start" "-a" "b928140efa5f49a0a37ada04fbcaa83d5ea9ef8ed1bf17c1dc8505cb81aa8938", kill_on_drop: false }`
[INFO] [stderr]    Compiling lock_api v0.4.9
[INFO] [stderr]     Checking scopeguard v1.1.0
[INFO] [stderr]    Compiling libm v0.2.5
[INFO] [stderr]    Compiling libc v0.2.133
[INFO] [stderr]    Compiling num-traits v0.2.15
[INFO] [stderr]    Compiling log v0.4.17
[INFO] [stderr]    Compiling x86 v0.51.0
[INFO] [stderr]     Checking ppv-lite86 v0.2.16
[INFO] [stderr]     Checking raw-cpuid v10.6.0
[INFO] [stderr]     Checking bit_field v0.10.1
[INFO] [stderr]     Checking either v1.8.0
[INFO] [stderr]     Checking float-ord v0.3.2
[INFO] [stderr]     Checking spin v0.9.4
[INFO] [stderr]     Checking spinning_top v0.2.4
[INFO] [stderr]     Checking linked_list_allocator v0.10.3
[INFO] [stderr]     Checking good_memory_allocator v0.1.7 (/opt/rustwide/workdir)
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]    --> src/chunks.rs:740:10
[INFO] [stdout]     |
[INFO] [stdout] 740 |     Used(UsedChunkRef),
[INFO] [stdout]     |     ---- ^^^^^^^^^^^^
[INFO] [stdout]     |     |
[INFO] [stdout]     |     field in this variant
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]     |
[INFO] [stdout] 740 |     Used(()),
[INFO] [stdout]     |          ~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking getrandom v0.2.7
[INFO] [stderr]     Checking easy-cast v0.4.4
[INFO] [stderr]     Checking simple-chunk-allocator v0.1.5
[INFO] [stderr]     Checking rand_core v0.6.4
[INFO] [stderr]     Checking rand_chacha v0.3.1
[INFO] [stderr]     Checking rand v0.8.5
[INFO] [stderr]     Checking average v0.13.1
[INFO] [stdout] warning: the feature `nonnull_slice_from_raw_parts` has been stable since 1.70.0 and no longer requires an attribute to enable
[INFO] [stdout]   --> examples/simple_chunk_allocator_benchmark.rs:24:12
[INFO] [stdout]    |
[INFO] [stdout] 24 | #![feature(nonnull_slice_from_raw_parts)]
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(stable_features)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: the feature `const_mut_refs` has been stable since 1.83.0 and no longer requires an attribute to enable
[INFO] [stdout]  --> examples/allocator_benchmarks.rs:4:12
[INFO] [stdout]   |
[INFO] [stdout] 4 | #![feature(const_mut_refs)]
[INFO] [stdout]   |            ^^^^^^^^^^^^^^
[INFO] [stdout]   |
[INFO] [stdout]   = note: `#[warn(stable_features)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0277]: the trait bound `SpinLockedAllocator<20, 8>: std::alloc::Allocator` is not satisfied
[INFO] [stdout]   --> examples/simple_chunk_allocator_benchmark.rs:79:43
[INFO] [stdout]    |
[INFO] [stdout] 79 |     let bench_res_3 = benchmark_allocator(&mut galloc_allocator);
[INFO] [stdout]    |                                           ^^^^^^^^^^^^^^^^^^^^^ the trait `std::alloc::Allocator` is not implemented for `SpinLockedAllocator<20, 8>`
[INFO] [stdout]    |
[INFO] [stdout]    = help: the following other types implement trait `std::alloc::Allocator`:
[INFO] [stdout]              &A
[INFO] [stdout]              AllocatorApiGlue<'a, 'b, CHUNK_SIZE>
[INFO] [stdout]              LockedHeap
[INFO] [stdout]              System
[INFO] [stdout]              std::alloc::Global
[INFO] [stdout]    = note: required for the cast from `&mut SpinLockedAllocator<20, 8>` to `&mut dyn std::alloc::Allocator`
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] For more information about this error, try `rustc --explain E0277`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `good_memory_allocator` (example "simple_chunk_allocator_benchmark") due to 1 previous error; 1 warning emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:113:40
[INFO] [stdout]     |
[INFO] [stdout] 113 |     GlobalChunkAllocator::new(unsafe { HEAP.deref_mut_const() }, unsafe {
[INFO] [stdout]     |                                        ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:114:9
[INFO] [stdout]     |
[INFO] [stdout] 114 |         HEAP_BITMAP.deref_mut_const()
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:169:21
[INFO] [stdout]     |
[INFO] [stdout] 169 |     unsafe { a.init(HEAP.as_mut_ptr(), HEAP_SIZE) }
[INFO] [stdout]     |                     ^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:177:14
[INFO] [stdout]     |
[INFO] [stdout] 177 |     unsafe { GALLOC_ALLOCATOR.init(HEAP.as_ptr() as usize, HEAP_SIZE) }
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:177:36
[INFO] [stdout]     |
[INFO] [stdout] 177 |     unsafe { GALLOC_ALLOCATOR.init(HEAP.as_ptr() as usize, HEAP_SIZE) }
[INFO] [stdout]     |                                    ^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:178:14
[INFO] [stdout]     |
[INFO] [stdout] 178 |     unsafe { &GALLOC_ALLOCATOR }
[INFO] [stdout]     |              ^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] help: use `&raw const` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 178 |     unsafe { &raw const GALLOC_ALLOCATOR }
[INFO] [stdout]     |              ~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:185:13
[INFO] [stdout]     |
[INFO] [stdout] 185 |             HEAP.deref_mut_const(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged
[INFO] [stdout]    --> examples/allocator_benchmarks.rs:186:13
[INFO] [stdout]     |
[INFO] [stdout] 186 |             HEAP_BITMAP.deref_mut_const(),
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] running `Command { std: "docker" "inspect" "b928140efa5f49a0a37ada04fbcaa83d5ea9ef8ed1bf17c1dc8505cb81aa8938", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "b928140efa5f49a0a37ada04fbcaa83d5ea9ef8ed1bf17c1dc8505cb81aa8938", kill_on_drop: false }`
[INFO] [stdout] b928140efa5f49a0a37ada04fbcaa83d5ea9ef8ed1bf17c1dc8505cb81aa8938
