[INFO] fetching crate rsgc 1.1.0... [INFO] checking rsgc-1.1.0 against master#91c0823ee63e793d990bb9fed898dc95b5d6db51 for pr-125384-2 [INFO] extracting crate rsgc 1.1.0 into /workspace/builds/worker-1-tc1/source [INFO] validating manifest of crates.io crate rsgc 1.1.0 on toolchain 91c0823ee63e793d990bb9fed898dc95b5d6db51 [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+91c0823ee63e793d990bb9fed898dc95b5d6db51" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate rsgc 1.1.0 [INFO] finished tweaking crates.io crate rsgc 1.1.0 [INFO] tweaked toml for crates.io crate rsgc 1.1.0 written to /workspace/builds/worker-1-tc1/source/Cargo.toml [INFO] crate crates.io crate rsgc 1.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+91c0823ee63e793d990bb9fed898dc95b5d6db51" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Updating crates.io index [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded is-terminal v0.4.0 [INFO] [stderr] Downloaded io-lifetimes v1.0.2 [INFO] [stderr] Downloaded variance v0.1.3 [INFO] [stderr] Downloaded rustix v0.36.3 [INFO] [stderr] Downloaded scoped-thread-pool v1.0.3 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:dff56e7819e73ed36160586b3445e93eb0be776c16704aeeded9c3fb668b2384" "/opt/rustwide/cargo-home/bin/cargo" "+91c0823ee63e793d990bb9fed898dc95b5d6db51" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] f1742551955328c2c2f6536f579d24403333833e0fb4fdffb832524e0099716e [INFO] running `Command { std: "docker" "start" "-a" "f1742551955328c2c2f6536f579d24403333833e0fb4fdffb832524e0099716e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "f1742551955328c2c2f6536f579d24403333833e0fb4fdffb832524e0099716e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "f1742551955328c2c2f6536f579d24403333833e0fb4fdffb832524e0099716e", kill_on_drop: false }` [INFO] [stdout] f1742551955328c2c2f6536f579d24403333833e0fb4fdffb832524e0099716e [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:dff56e7819e73ed36160586b3445e93eb0be776c16704aeeded9c3fb668b2384" "/opt/rustwide/cargo-home/bin/cargo" "+91c0823ee63e793d990bb9fed898dc95b5d6db51" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] ad73e7c218d92999d9af774b1ec991598bc94a7e93bd51b96ad798b2d9265940 [INFO] running `Command { std: "docker" "start" "-a" "ad73e7c218d92999d9af774b1ec991598bc94a7e93bd51b96ad798b2d9265940", kill_on_drop: false }` [INFO] [stderr] Compiling libc v0.2.137 [INFO] [stderr] Compiling crossbeam-utils v0.8.14 [INFO] [stderr] Compiling memoffset v0.7.1 [INFO] [stderr] Checking scopeguard v1.1.0 [INFO] [stderr] Compiling crossbeam-epoch v0.9.13 [INFO] [stderr] Compiling memchr v2.5.0 [INFO] [stderr] Compiling io-lifetimes v1.0.2 [INFO] [stderr] Compiling rustix v0.36.3 [INFO] [stderr] Compiling crossbeam-queue v0.3.8 [INFO] [stderr] Compiling lock_api v0.4.7 [INFO] [stderr] Compiling log v0.4.17 [INFO] [stderr] Compiling parking_lot_core v0.9.3 [INFO] [stderr] Checking linux-raw-sys v0.1.3 [INFO] [stderr] Compiling num-traits v0.2.15 [INFO] [stderr] Compiling atomic v0.5.1 [INFO] [stderr] Checking regex-syntax v0.6.28 [INFO] [stderr] Checking smallvec v1.9.0 [INFO] [stderr] Checking once_cell v1.16.0 [INFO] [stderr] Checking termcolor v1.1.3 [INFO] [stderr] Checking variance v0.1.3 [INFO] [stderr] Checking str-buf v1.0.6 [INFO] [stderr] Checking thread_local v1.1.4 [INFO] [stderr] Compiling paste v1.0.9 [INFO] [stderr] Checking aho-corasick v0.7.20 [INFO] [stderr] Checking crossbeam-channel v0.5.6 [INFO] [stderr] Checking crossbeam-deque v0.8.2 [INFO] [stderr] Checking getrandom v0.2.8 [INFO] [stderr] Checking errno v0.3.0 [INFO] [stderr] Checking num_cpus v1.15.0 [INFO] [stderr] Checking error-code v2.3.1 [INFO] [stderr] Checking parking_lot v0.12.1 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking crossbeam v0.8.2 [INFO] [stderr] Checking scoped-thread-pool v1.0.3 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking regex v1.7.0 [INFO] [stderr] Checking is-terminal v0.4.0 [INFO] [stderr] Checking env_logger v0.10.0 [INFO] [stderr] Checking rsgc v1.1.0 (/opt/rustwide/workdir) [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 8.67s [INFO] running `Command { std: "docker" "inspect" "ad73e7c218d92999d9af774b1ec991598bc94a7e93bd51b96ad798b2d9265940", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "ad73e7c218d92999d9af774b1ec991598bc94a7e93bd51b96ad798b2d9265940", kill_on_drop: false }` [INFO] [stdout] ad73e7c218d92999d9af774b1ec991598bc94a7e93bd51b96ad798b2d9265940 [INFO] checking rsgc-1.1.0 against try#519d6e23a6cb73c4d0f295f71ad37db8e95c54ab for pr-125384-2 [INFO] extracting crate rsgc 1.1.0 into /workspace/builds/worker-1-tc2/source [INFO] validating manifest of crates.io crate rsgc 1.1.0 on toolchain 519d6e23a6cb73c4d0f295f71ad37db8e95c54ab [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+519d6e23a6cb73c4d0f295f71ad37db8e95c54ab" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] started tweaking crates.io crate rsgc 1.1.0 [INFO] finished tweaking crates.io crate rsgc 1.1.0 [INFO] tweaked toml for crates.io crate rsgc 1.1.0 written to /workspace/builds/worker-1-tc2/source/Cargo.toml [INFO] crate crates.io crate rsgc 1.1.0 already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+519d6e23a6cb73c4d0f295f71ad37db8e95c54ab" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:dff56e7819e73ed36160586b3445e93eb0be776c16704aeeded9c3fb668b2384" "/opt/rustwide/cargo-home/bin/cargo" "+519d6e23a6cb73c4d0f295f71ad37db8e95c54ab" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 1acda8302b2880ac1e373dc4a94aecde49c4f514c6592ae6b3d06c54c1f11c4e [INFO] running `Command { std: "docker" "start" "-a" "1acda8302b2880ac1e373dc4a94aecde49c4f514c6592ae6b3d06c54c1f11c4e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "1acda8302b2880ac1e373dc4a94aecde49c4f514c6592ae6b3d06c54c1f11c4e", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "1acda8302b2880ac1e373dc4a94aecde49c4f514c6592ae6b3d06c54c1f11c4e", kill_on_drop: false }` [INFO] [stdout] 1acda8302b2880ac1e373dc4a94aecde49c4f514c6592ae6b3d06c54c1f11c4e [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-1-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=allow" "-e" "RUSTDOCFLAGS=--cap-lints=allow" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:dff56e7819e73ed36160586b3445e93eb0be776c16704aeeded9c3fb668b2384" "/opt/rustwide/cargo-home/bin/cargo" "+519d6e23a6cb73c4d0f295f71ad37db8e95c54ab" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }` [INFO] [stdout] 19d7624ae64107c41321374f9bd314ced40d22038d61e8548c9bca70b821c101 [INFO] running `Command { std: "docker" "start" "-a" "19d7624ae64107c41321374f9bd314ced40d22038d61e8548c9bca70b821c101", kill_on_drop: false }` [INFO] [stderr] Copying to /tmp/fixit [INFO] [stderr] Running `cargo fix --edition` [INFO] [stderr] Migrating Cargo.toml from 2021 edition to 2024 [INFO] [stderr] Compiling libc v0.2.137 [INFO] [stderr] Compiling crossbeam-utils v0.8.14 [INFO] [stderr] Compiling memoffset v0.7.1 [INFO] [stderr] Checking scopeguard v1.1.0 [INFO] [stderr] Compiling crossbeam-epoch v0.9.13 [INFO] [stderr] Compiling memchr v2.5.0 [INFO] [stderr] Compiling io-lifetimes v1.0.2 [INFO] [stderr] Compiling rustix v0.36.3 [INFO] [stderr] Compiling crossbeam-queue v0.3.8 [INFO] [stderr] Compiling lock_api v0.4.7 [INFO] [stderr] Compiling parking_lot_core v0.9.3 [INFO] [stderr] Checking linux-raw-sys v0.1.3 [INFO] [stderr] Compiling log v0.4.17 [INFO] [stderr] Compiling num-traits v0.2.15 [INFO] [stderr] Compiling atomic v0.5.1 [INFO] [stderr] Checking regex-syntax v0.6.28 [INFO] [stderr] Checking smallvec v1.9.0 [INFO] [stderr] Checking termcolor v1.1.3 [INFO] [stderr] Checking once_cell v1.16.0 [INFO] [stderr] Checking variance v0.1.3 [INFO] [stderr] Checking str-buf v1.0.6 [INFO] [stderr] Compiling paste v1.0.9 [INFO] [stderr] Checking thread_local v1.1.4 [INFO] [stderr] Checking crossbeam-channel v0.5.6 [INFO] [stderr] Checking crossbeam-deque v0.8.2 [INFO] [stderr] Checking aho-corasick v0.7.20 [INFO] [stderr] Checking crossbeam v0.8.2 [INFO] [stderr] Checking scoped-thread-pool v1.0.3 [INFO] [stderr] Checking getrandom v0.2.8 [INFO] [stderr] Checking error-code v2.3.1 [INFO] [stderr] Checking errno v0.3.0 [INFO] [stderr] Checking num_cpus v1.15.0 [INFO] [stderr] Checking regex v1.7.0 [INFO] [stderr] Checking rand_core v0.6.4 [INFO] [stderr] Checking parking_lot v0.12.1 [INFO] [stderr] Checking rand_chacha v0.3.1 [INFO] [stderr] Checking rand v0.8.5 [INFO] [stderr] Checking is-terminal v0.4.0 [INFO] [stderr] Checking env_logger v0.10.0 [INFO] [stderr] Checking rsgc v1.1.0 (/tmp/fixit) [INFO] [stderr] Migrating src/lib.rs from 2021 edition to 2024 [INFO] [stderr] Fixed src/heap/card_table.rs (1 fix) [INFO] [stderr] Fixed src/heap/safepoint.rs (1 fix) [INFO] [stderr] Fixed src/heap/marking_context.rs (2 fixes) [INFO] [stderr] Fixed src/system/arraylist.rs (2 fixes) [INFO] [stderr] Fixed src/heap/degenerated_gc.rs (1 fix) [INFO] [stderr] Fixed src/heap/heap.rs (6 fixes) [INFO] [stderr] Fixed src/system/weak_reference.rs (1 fix) [INFO] [stderr] Fixed src/sync/mutex.rs (1 fix) [INFO] [stderr] Fixed src/heap/region.rs (1 fix) [INFO] [stderr] Fixed src/sync/monitor.rs (1 fix) [INFO] [stderr] Fixed src/heap/full_gc.rs (1 fix) [INFO] [stderr] Fixed src/utils/sloppy_memset.rs (5 fixes) [INFO] [stderr] Fixed src/heap/free_list.rs (7 fixes) [INFO] [stderr] Fixed src/utils/bitvector.rs (2 fixes) [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:553:65 [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != &mut SINK } [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(static_mut_refs)]` [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != addr_of_mut!(SINK) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Fixed src/heap/sweeper.rs (1 fix) [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:558:18 [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { &mut THREAD } [INFO] [stdout] | ^^^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { addr_of_mut!(THREAD) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Fixed src/system/finalizer.rs (2 fixes) [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:733:32 [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = &mut SINK; [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = addr_of_mut!(SINK); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Fixed src/heap/signals/unix.rs (3 fixes) [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/lib.rs:84:35 [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(&mut SINK, val as usize); [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(addr_of_mut!(SINK), val as usize); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Fixed src/system/object.rs (2 fixes) [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Fixed src/heap/mark.rs (4 fixes) [INFO] [stderr] Fixed src/heap/free_set.rs (2 fixes) [INFO] [stderr] Fixed src/heap/thread.rs (7 fixes) [INFO] [stderr] Fixed src/sync/semaphore.rs (1 fix) [INFO] [stderr] Fixed src/heap/stack.rs (1 fix) [INFO] [stderr] Fixed src/heap/tlab.rs (1 fix) [INFO] [stderr] Fixed src/heap/obj_storage.rs (7 fixes) [INFO] [stderr] Fixed src/heap/virtual_memory.rs (4 fixes) [INFO] [stderr] Migrating src/main.rs from 2021 edition to 2024 [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:553:65 [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != &mut SINK } [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] = note: `--force-warn static-mut-refs` implied by `--force-warn rust-2024-compatibility` [INFO] [stdout] = help: to override `--force-warn rust-2024-compatibility` add `#[allow(static_mut_refs)]` [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != addr_of_mut!(SINK) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:558:18 [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { &mut THREAD } [INFO] [stdout] | ^^^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { addr_of_mut!(THREAD) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/heap/thread.rs:733:32 [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = &mut SINK; [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = addr_of_mut!(SINK); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: creating a mutable reference to mutable static is discouraged [INFO] [stdout] --> src/lib.rs:84:35 [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(&mut SINK, val as usize); [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: for more information, see issue #114447 [INFO] [stdout] = note: this will be a hard error in the 2024 edition [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(addr_of_mut!(SINK), val as usize); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: 4 warnings emitted [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Migrating examples/binarytrees.rs from 2021 edition to 2024 [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 10.79s [INFO] [stderr] Running `cargo check` to verify 2024 [INFO] [stderr] Checking rsgc v1.1.0 (/tmp/fixit) [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:553:65 [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != &mut SINK } [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != addr_of_mut!(SINK) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:558:18 [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { &mut THREAD } [INFO] [stdout] | ^^^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { addr_of_mut!(THREAD) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:733:32 [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = &mut SINK; [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = addr_of_mut!(SINK); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:553:65 [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != &mut SINK } [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 553 | !self.safepoint.is_null() && unsafe { self.safepoint != addr_of_mut!(SINK) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:558:18 [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { &mut THREAD } [INFO] [stdout] | ^^^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 558 | unsafe { addr_of_mut!(THREAD) } [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/heap/thread.rs:733:32 [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = &mut SINK; [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 733 | thread.safepoint = addr_of_mut!(SINK); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/lib.rs:84:35 [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(&mut SINK, val as usize); [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(addr_of_mut!(SINK), val as usize); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error[E0796]: creating a mutable reference to a mutable static [INFO] [stdout] --> src/lib.rs:84:35 [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(&mut SINK, val as usize); [INFO] [stdout] | ^^^^^^^^^ mutable reference to mutable static [INFO] [stdout] | [INFO] [stdout] = note: this mutable reference has lifetime `'static`, but if the static gets accessed (read or written) by any other means, or any other reference is created, then any further use of this mutable reference is Undefined Behavior [INFO] [stdout] help: use `addr_of_mut!` instead to create a raw pointer [INFO] [stdout] | [INFO] [stdout] 84 | core::ptr::write_volatile(addr_of_mut!(SINK), val as usize); [INFO] [stdout] | ~~~~~~~~~~~~~~~~~~ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] error: aborting due to 4 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0796`. [INFO] [stdout] [INFO] [stderr] error: could not compile `rsgc` (lib) due to 5 previous errors [INFO] [stderr] warning: build failed, waiting for other jobs to finish... [INFO] [stdout] error: aborting due to 4 previous errors [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] For more information about this error, try `rustc --explain E0796`. [INFO] [stdout] [INFO] [stderr] error: could not compile `rsgc` (lib test) due to 5 previous errors [INFO] [stderr] error: failed to check after updating to 2024 [INFO] [stderr] [INFO] [stderr] Caused by: [INFO] [stderr] process didn't exit successfully: `cargo check --frozen --all --all-targets --message-format=json` (exit status: 101) [INFO] running `Command { std: "docker" "inspect" "19d7624ae64107c41321374f9bd314ced40d22038d61e8548c9bca70b821c101", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "19d7624ae64107c41321374f9bd314ced40d22038d61e8548c9bca70b821c101", kill_on_drop: false }` [INFO] [stdout] 19d7624ae64107c41321374f9bd314ced40d22038d61e8548c9bca70b821c101