[INFO] fetching crate ast-grep-dynamic 0.14.1...
[INFO] checking ast-grep-dynamic-0.14.1 against master#5518eaa946291f00471af8b254b2a1715f234882 for pr-120393
[INFO] extracting crate ast-grep-dynamic 0.14.1 into /workspace/builds/worker-2-tc1/source
[INFO] validating manifest of crates.io crate ast-grep-dynamic 0.14.1 on toolchain 5518eaa946291f00471af8b254b2a1715f234882
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] started tweaking crates.io crate ast-grep-dynamic 0.14.1
[INFO] finished tweaking crates.io crate ast-grep-dynamic 0.14.1
[INFO] tweaked toml for crates.io crate ast-grep-dynamic 0.14.1 written to /workspace/builds/worker-2-tc1/source/Cargo.toml
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "generate-lockfile" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]     Updating crates.io index
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] [stderr]  Downloading crates ...
[INFO] [stderr]   Downloaded libloading v0.8.1
[INFO] [stderr]   Downloaded tree-sitter-facade-sg v0.9.2
[INFO] [stderr]   Downloaded web-tree-sitter-sg v1.3.4
[INFO] [stderr]   Downloaded ignore v0.4.22
[INFO] [stderr]   Downloaded globset v0.4.14
[INFO] [stderr]   Downloaded tree-sitter v0.20.10
[INFO] [stderr]   Downloaded bstr v1.9.0
[INFO] [stderr]   Downloaded ast-grep-core v0.14.4
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] ce173982fca1b314685429eb847b2eec89c126b67724e69791406d0ff5b4e3b0
[INFO] running `Command { std: "docker" "start" "-a" "ce173982fca1b314685429eb847b2eec89c126b67724e69791406d0ff5b4e3b0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "ce173982fca1b314685429eb847b2eec89c126b67724e69791406d0ff5b4e3b0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "ce173982fca1b314685429eb847b2eec89c126b67724e69791406d0ff5b4e3b0", kill_on_drop: false }`
[INFO] [stdout] ce173982fca1b314685429eb847b2eec89c126b67724e69791406d0ff5b4e3b0
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:2788e3201cd34a07e3172128adcd8b3090168a8e3bcc40d7c032b9dda1df7d1c" "/opt/rustwide/cargo-home/bin/cargo" "+5518eaa946291f00471af8b254b2a1715f234882" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] bbf58dee4ea955c28fdf6e5da2fe92b79422c04966f8403756a6361dbc9ecc90
[INFO] running `Command { std: "docker" "start" "-a" "bbf58dee4ea955c28fdf6e5da2fe92b79422c04966f8403756a6361dbc9ecc90", kill_on_drop: false }`
[INFO] [stderr]     Checking memchr v2.7.1
[INFO] [stderr]    Compiling wasm-bindgen-shared v0.2.90
[INFO] [stderr]     Checking regex-syntax v0.8.2
[INFO] [stderr]    Compiling log v0.4.20
[INFO] [stderr]    Compiling bumpalo v3.14.0
[INFO] [stderr]    Compiling once_cell v1.19.0
[INFO] [stderr]    Compiling crossbeam-utils v0.8.19
[INFO] [stderr]    Compiling wasm-bindgen v0.2.90
[INFO] [stderr]     Checking bit-vec v0.6.3
[INFO] [stderr]     Checking same-file v1.0.6
[INFO] [stderr]     Checking libloading v0.8.1
[INFO] [stderr]    Compiling syn v2.0.48
[INFO] [stderr]    Compiling tree-sitter v0.20.10
[INFO] [stderr]     Checking walkdir v2.4.0
[INFO] [stderr]     Checking bit-set v0.5.3
[INFO] [stderr]     Checking aho-corasick v1.1.2
[INFO] [stderr]     Checking bstr v1.9.0
[INFO] [stderr]     Checking crossbeam-epoch v0.9.18
[INFO] [stderr]     Checking crossbeam-deque v0.8.5
[INFO] [stderr]     Checking regex-automata v0.4.5
[INFO] [stderr]    Compiling wasm-bindgen-backend v0.2.90
[INFO] [stderr]    Compiling thiserror-impl v1.0.56
[INFO] [stderr]    Compiling serde_derive v1.0.196
[INFO] [stderr]    Compiling wasm-bindgen-macro-support v0.2.90
[INFO] [stderr]     Checking regex v1.10.3
[INFO] [stderr]     Checking globset v0.4.14
[INFO] [stderr]     Checking ignore v0.4.22
[INFO] [stderr]    Compiling wasm-bindgen-macro v0.2.90
[INFO] [stderr]     Checking thiserror v1.0.56
[INFO] [stderr]     Checking tree-sitter-facade-sg v0.9.2
[INFO] [stderr]     Checking ast-grep-core v0.14.4
[INFO] [stderr]     Checking serde v1.0.196
[INFO] [stderr]     Checking ast-grep-dynamic v0.14.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]   --> src/lib.rs:39:28
[INFO] [stdout]    |
[INFO] [stdout] 39 |     let mapping = unsafe { &LANG_INDEX };
[INFO] [stdout]    |                            ^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]    = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout]    = note: `#[warn(static_mut_ref)]` on by default
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 39 |     let mapping = unsafe { addr_of!(LANG_INDEX) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]   --> src/lib.rs:39:28
[INFO] [stdout]    |
[INFO] [stdout] 39 |     let mapping = unsafe { &LANG_INDEX };
[INFO] [stdout]    |                            ^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]    = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]    = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout]    = note: `#[warn(static_mut_ref)]` on by default
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]    |
[INFO] [stdout] 39 |     let mapping = unsafe { addr_of!(LANG_INDEX) };
[INFO] [stdout]    |                            ~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: mutable reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:159:27
[INFO] [stdout]     |
[INFO] [stdout] 159 |     _ = std::mem::replace(&mut DYNAMIC_LANG, langs);
[INFO] [stdout]     |                           ^^^^^^^^^^^^^^^^^ mutable reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: mutable references are dangerous since if there's any other pointer or reference used for that static while the reference lives, that's UB; use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 159 |     _ = std::mem::replace(addr_of_mut!(DYNAMIC_LANG), langs);
[INFO] [stdout]     |                           ~~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: mutable reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:160:27
[INFO] [stdout]     |
[INFO] [stdout] 160 |     _ = std::mem::replace(&mut LANG_INDEX, mapping);
[INFO] [stdout]     |                           ^^^^^^^^^^^^^^^ mutable reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: mutable references are dangerous since if there's any other pointer or reference used for that static while the reference lives, that's UB; use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 160 |     _ = std::mem::replace(addr_of_mut!(LANG_INDEX), mapping);
[INFO] [stdout]     |                           ~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: mutable reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:159:27
[INFO] [stdout]     |
[INFO] [stdout] 159 |     _ = std::mem::replace(&mut DYNAMIC_LANG, langs);
[INFO] [stdout]     |                           ^^^^^^^^^^^^^^^^^ mutable reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: mutable references are dangerous since if there's any other pointer or reference used for that static while the reference lives, that's UB; use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 159 |     _ = std::mem::replace(addr_of_mut!(DYNAMIC_LANG), langs);
[INFO] [stdout]     |                           ~~~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: mutable reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:160:27
[INFO] [stdout]     |
[INFO] [stdout] 160 |     _ = std::mem::replace(&mut LANG_INDEX, mapping);
[INFO] [stdout]     |                           ^^^^^^^^^^^^^^^ mutable reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: mutable references are dangerous since if there's any other pointer or reference used for that static while the reference lives, that's UB; use `addr_of_mut!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 160 |     _ = std::mem::replace(addr_of_mut!(LANG_INDEX), mapping);
[INFO] [stdout]     |                           ~~~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:197:14
[INFO] [stdout]     |
[INFO] [stdout] 197 |     unsafe { &DYNAMIC_LANG }
[INFO] [stdout]     |              ^^^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 197 |     unsafe { addr_of!(DYNAMIC_LANG) }
[INFO] [stdout]     |              ~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:197:14
[INFO] [stdout]     |
[INFO] [stdout] 197 |     unsafe { &DYNAMIC_LANG }
[INFO] [stdout]     |              ^^^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 197 |     unsafe { addr_of!(DYNAMIC_LANG) }
[INFO] [stdout]     |              ~~~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:209:28
[INFO] [stdout]     |
[INFO] [stdout] 209 |     let mapping = unsafe { &LANG_INDEX };
[INFO] [stdout]     |                            ^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 209 |     let mapping = unsafe { addr_of!(LANG_INDEX) };
[INFO] [stdout]     |                            ~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: shared reference of mutable static is discouraged
[INFO] [stdout]    --> src/lib.rs:209:28
[INFO] [stdout]     |
[INFO] [stdout] 209 |     let mapping = unsafe { &LANG_INDEX };
[INFO] [stdout]     |                            ^^^^^^^^^^^ shared reference of mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see issue #114447 <https://github.com/rust-lang/rust/issues/114447>
[INFO] [stdout]     = note: reference of mutable static is a hard error from 2024 edition
[INFO] [stdout]     = note: mutable statics can be written to by multiple threads: aliasing violations or data races will cause undefined behavior
[INFO] [stdout] help: shared references are dangerous since if there's any kind of mutation of that static while the reference lives, that's UB; use `addr_of!` instead to create a raw pointer
[INFO] [stdout]     |
[INFO] [stdout] 209 |     let mapping = unsafe { addr_of!(LANG_INDEX) };
[INFO] [stdout]     |                            ~~~~~~~~~~~~~~~~~~~~
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 5 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: 5 warnings emitted
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished dev [unoptimized + debuginfo] target(s) in 8.30s
[INFO] running `Command { std: "docker" "inspect" "bbf58dee4ea955c28fdf6e5da2fe92b79422c04966f8403756a6361dbc9ecc90", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "bbf58dee4ea955c28fdf6e5da2fe92b79422c04966f8403756a6361dbc9ecc90", kill_on_drop: false }`
[INFO] [stdout] bbf58dee4ea955c28fdf6e5da2fe92b79422c04966f8403756a6361dbc9ecc90
