[INFO] cloning repository https://github.com/terrarier2111/packed_encoding
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/terrarier2111/packed_encoding" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fterrarier2111%2Fpacked_encoding", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fterrarier2111%2Fpacked_encoding'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 4525429ed33ac9e989849aefe9a1c2904c9cc770
[INFO] checking terrarier2111/packed_encoding against try#54cf65b8d066c082e536455049b95943cf30378f for pr-151920
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fterrarier2111%2Fpacked_encoding" "/workspace/builds/worker-1-tc2/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-1-tc2/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/terrarier2111/packed_encoding
[INFO] finished tweaking git repo https://github.com/terrarier2111/packed_encoding
[INFO] tweaked toml for git repo https://github.com/terrarier2111/packed_encoding written to /workspace/builds/worker-1-tc2/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/terrarier2111/packed_encoding on toolchain 54cf65b8d066c082e536455049b95943cf30378f
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+54cf65b8d066c082e536455049b95943cf30378f" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/terrarier2111/packed_encoding already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+54cf65b8d066c082e536455049b95943cf30378f" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] [stderr]     Blocking waiting for file lock on package cache
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+54cf65b8d066c082e536455049b95943cf30378f" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 3eb0519134c55a267a2c05f655583330920d09ec758b28c4efc08371be646bc1
[INFO] running `Command { std: "docker" "start" "-a" "3eb0519134c55a267a2c05f655583330920d09ec758b28c4efc08371be646bc1", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "3eb0519134c55a267a2c05f655583330920d09ec758b28c4efc08371be646bc1", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "3eb0519134c55a267a2c05f655583330920d09ec758b28c4efc08371be646bc1", kill_on_drop: false }`
[INFO] [stdout] 3eb0519134c55a267a2c05f655583330920d09ec758b28c4efc08371be646bc1
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:61361fe0aef631f17e9d025a70c5a647956f8c671dd02950a60ad3f5cc5526d7" "/opt/rustwide/cargo-home/bin/cargo" "+54cf65b8d066c082e536455049b95943cf30378f" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 851b7c7581ef2ee52208afb7c89b7f82a03b1e0aa60b28be17ce376e77074abc
[INFO] running `Command { std: "docker" "start" "-a" "851b7c7581ef2ee52208afb7c89b7f82a03b1e0aa60b28be17ce376e77074abc", kill_on_drop: false }`
[INFO] [stderr]     Checking packed_dyn v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] error[E0282]: type annotations needed for `MaybeUninit<_>`
[INFO] [stdout]   --> src/packed_dyn.rs:12:17
[INFO] [stdout]    |
[INFO] [stdout] 12 |             let mut finish = MaybeUninit::zeroed();
[INFO] [stdout]    |                 ^^^^^^^^^^
[INFO] [stdout] 13 |
[INFO] [stdout] 14 |             unsafe { finish.as_mut_ptr().cast::<T>().write(val); }
[INFO] [stdout]    |                                          ---- cannot call a method on a raw pointer with an unknown pointee type
[INFO] [stdout]    |
[INFO] [stdout] help: consider giving `finish` an explicit type, where the placeholders `_` are specified
[INFO] [stdout]    |
[INFO] [stdout] 12 |             let mut finish: MaybeUninit<T> = MaybeUninit::zeroed();
[INFO] [stdout]    |                           ++++++++++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0282]: type annotations needed for `MaybeUninit<_>`
[INFO] [stdout]   --> src/packed_dyn.rs:12:17
[INFO] [stdout]    |
[INFO] [stdout] 12 |             let mut finish = MaybeUninit::zeroed();
[INFO] [stdout]    |                 ^^^^^^^^^^
[INFO] [stdout] 13 |
[INFO] [stdout] 14 |             unsafe { finish.as_mut_ptr().cast::<T>().write(val); }
[INFO] [stdout]    |                                          ---- cannot call a method on a raw pointer with an unknown pointee type
[INFO] [stdout]    |
[INFO] [stdout] help: consider giving `finish` an explicit type, where the placeholders `_` are specified
[INFO] [stdout]    |
[INFO] [stdout] 12 |             let mut finish: MaybeUninit<T> = MaybeUninit::zeroed();
[INFO] [stdout]    |                           ++++++++++++++++
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/packed_ptr.rs:53:48
[INFO] [stdout]    |
[INFO] [stdout] 53 |             val.write(ManuallyDrop::into_inner(self.inline));
[INFO] [stdout]    |                                                ^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/packed_ptr.rs:56:21
[INFO] [stdout]    |
[INFO] [stdout] 56 |             dealloc(self.ptr);
[INFO] [stdout]    |                     ^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/packed_ptr.rs:53:48
[INFO] [stdout]    |
[INFO] [stdout] 53 |             val.write(ManuallyDrop::into_inner(self.inline));
[INFO] [stdout]    |                                                ^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/packed_ptr.rs:56:21
[INFO] [stdout]    |
[INFO] [stdout] 56 |             dealloc(self.ptr);
[INFO] [stdout]    |                     ^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/packed_ptr.rs:50:39
[INFO] [stdout]    |
[INFO] [stdout] 50 |     pub fn destroy<F: FnOnce(*mut T)>(mut self, dealloc: F) {
[INFO] [stdout]    |                                       ----^^^^
[INFO] [stdout]    |                                       |
[INFO] [stdout]    |                                       help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]   --> src/packed_ptr.rs:50:39
[INFO] [stdout]    |
[INFO] [stdout] 50 |     pub fn destroy<F: FnOnce(*mut T)>(mut self, dealloc: F) {
[INFO] [stdout]    |                                       ----^^^^
[INFO] [stdout]    |                                       |
[INFO] [stdout]    |                                       help: remove this `mut`
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/nan_box.rs:37:9
[INFO] [stdout]    |
[INFO] [stdout] 37 |         self.tagged & !(SIGN_MASK | ARBITRARY_FIELD_MASK) > EXP_FIELD_MASK
[INFO] [stdout]    |         ^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] error[E0133]: access to union field is unsafe and requires unsafe function or block
[INFO] [stdout]   --> src/nan_box.rs:37:9
[INFO] [stdout]    |
[INFO] [stdout] 37 |         self.tagged & !(SIGN_MASK | ARBITRARY_FIELD_MASK) > EXP_FIELD_MASK
[INFO] [stdout]    |         ^^^^^^^^^^^ access to union field
[INFO] [stdout]    |
[INFO] [stdout]    = note: the field may not be properly initialized: using uninitialized data will cause undefined behavior
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] Some errors have detailed explanations: E0133, E0282.
[INFO] [stdout] 
[INFO] [stdout] Some errors have detailed explanations: E0133, E0282.
[INFO] [stdout] 
[INFO] [stdout] For more information about an error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stdout] For more information about an error, try `rustc --explain E0133`.
[INFO] [stdout] 
[INFO] [stderr] error: could not compile `packed_dyn` (bin "packed_dyn") due to 4 previous errors; 1 warning emitted
[INFO] [stderr] warning: build failed, waiting for other jobs to finish...
[INFO] [stderr] error: could not compile `packed_dyn` (bin "packed_dyn" test) due to 4 previous errors; 1 warning emitted
[INFO] running `Command { std: "docker" "inspect" "851b7c7581ef2ee52208afb7c89b7f82a03b1e0aa60b28be17ce376e77074abc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "851b7c7581ef2ee52208afb7c89b7f82a03b1e0aa60b28be17ce376e77074abc", kill_on_drop: false }`
[INFO] [stdout] 851b7c7581ef2ee52208afb7c89b7f82a03b1e0aa60b28be17ce376e77074abc
