[INFO] cloning repository https://github.com/rust-embedded/cross
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/rust-embedded/cross" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Frust-embedded%2Fcross", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Frust-embedded%2Fcross'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 51f46f296253d8122c927c5bb933e3c4f27cc317
[INFO] checking rust-embedded/cross against master#8a65ee08296b36342bf7c3cdc15312ccbc357227 for pr-142704
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Frust-embedded%2Fcross" "/workspace/builds/worker-0-tc1/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-0-tc1/source'...
[INFO] [stderr] done.
[INFO] validating manifest of git repo https://github.com/rust-embedded/cross on toolchain 8a65ee08296b36342bf7c3cdc15312ccbc357227
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] removed /workspace/builds/worker-0-tc1/source/.cargo/config.toml
[INFO] started tweaking git repo https://github.com/rust-embedded/cross
[INFO] finished tweaking git repo https://github.com/rust-embedded/cross
[INFO] tweaked toml for git repo https://github.com/rust-embedded/cross written to /workspace/builds/worker-0-tc1/source/Cargo.toml
[INFO] crate git repo https://github.com/rust-embedded/cross already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] c47103c3ae44b1b0464d951a5de9e2b57cc1aa48b4e741684e13a044a997aff8
[INFO] running `Command { std: "docker" "start" "-a" "c47103c3ae44b1b0464d951a5de9e2b57cc1aa48b4e741684e13a044a997aff8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "c47103c3ae44b1b0464d951a5de9e2b57cc1aa48b4e741684e13a044a997aff8", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "c47103c3ae44b1b0464d951a5de9e2b57cc1aa48b4e741684e13a044a997aff8", kill_on_drop: false }`
[INFO] [stdout] c47103c3ae44b1b0464d951a5de9e2b57cc1aa48b4e741684e13a044a997aff8
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-0-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8a65ee08296b36342bf7c3cdc15312ccbc357227" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 747e254e8e1aae92952d5fdd933e1a7a962ac66638383001997177d494ab0cfc
[INFO] running `Command { std: "docker" "start" "-a" "747e254e8e1aae92952d5fdd933e1a7a962ac66638383001997177d494ab0cfc", kill_on_drop: false }`
[INFO] [stderr]    Compiling proc-macro2 v1.0.81
[INFO] [stderr]    Compiling unicode-ident v1.0.12
[INFO] [stderr]    Compiling libc v0.2.168
[INFO] [stderr]     Checking memchr v2.7.2
[INFO] [stderr]     Checking once_cell v1.19.0
[INFO] [stderr]     Checking cfg-if v1.0.0
[INFO] [stderr]    Compiling serde v1.0.199
[INFO] [stderr]     Checking lazy_static v1.4.0
[INFO] [stderr]    Compiling rustix v0.38.34
[INFO] [stderr]     Checking pin-project-lite v0.2.14
[INFO] [stderr]     Checking sharded-slab v0.1.7
[INFO] [stderr]    Compiling cc v1.0.96
[INFO] [stderr]     Checking tracing-core v0.1.32
[INFO] [stderr]     Checking thread_local v1.1.8
[INFO] [stderr]     Checking utf8parse v0.2.1
[INFO] [stderr]     Checking is_ci v1.2.0
[INFO] [stderr]     Checking anstyle-parse v0.2.3
[INFO] [stderr]     Checking gimli v0.28.1
[INFO] [stderr]     Checking hashbrown v0.14.5
[INFO] [stderr]     Checking anstyle-query v1.0.2
[INFO] [stderr]    Compiling eyre v0.6.12
[INFO] [stderr]     Checking linux-raw-sys v0.4.13
[INFO] [stderr]     Checking tracing-subscriber v0.3.18
[INFO] [stderr]     Checking tracing v0.1.40
[INFO] [stderr]     Checking anstyle v1.0.6
[INFO] [stderr]    Compiling quote v1.0.36
[INFO] [stderr]     Checking bitflags v2.5.0
[INFO] [stderr]     Checking colorchoice v1.0.0
[INFO] [stderr]    Compiling syn v2.0.60
[INFO] [stderr]    Compiling backtrace v0.3.71
[INFO] [stderr]     Checking equivalent v1.0.1
[INFO] [stderr]     Checking adler v1.0.2
[INFO] [stderr]    Compiling semver v1.0.22
[INFO] [stderr]     Checking indexmap v2.2.6
[INFO] [stderr]     Checking miniz_oxide v0.7.2
[INFO] [stderr]     Checking anstream v0.6.13
[INFO] [stderr]     Checking object v0.32.2
[INFO] [stderr]     Checking strsim v0.11.1
[INFO] [stderr]     Checking tracing-error v0.2.0
[INFO] [stderr]    Compiling thiserror v1.0.59
[INFO] [stderr]    Compiling serde_json v1.0.116
[INFO] [stderr]    Compiling heck v0.5.0
[INFO] [stderr]     Checking winnow v0.5.40
[INFO] [stderr]     Checking rustc-demangle v0.1.23
[INFO] [stderr]    Compiling signal-hook v0.3.17
[INFO] [stderr]     Checking atty v0.2.14
[INFO] [stderr]     Checking supports-color v1.3.1
[INFO] [stderr]     Checking clap_lex v0.7.0
[INFO] [stderr]     Checking indenter v0.3.3
[INFO] [stderr]     Checking owo-colors v3.5.0
[INFO] [stderr]     Checking clap_builder v4.5.2
[INFO] [stderr]     Checking signal-hook-registry v1.4.2
[INFO] [stderr]     Checking addr2line v0.21.0
[INFO] [stderr]     Checking dirs-sys v0.3.7
[INFO] [stderr]    Compiling cross v0.2.5 (/opt/rustwide/workdir)
[INFO] [stderr]     Checking fastrand v2.1.0
[INFO] [stderr]     Checking home v0.5.9
[INFO] [stderr]     Checking itoa v1.0.11
[INFO] [stderr]     Checking color-spantrace v0.2.1
[INFO] [stderr]     Checking either v1.11.0
[INFO] [stderr]     Checking bitflags v1.3.2
[INFO] [stderr]     Checking ryu v1.0.17
[INFO] [stderr]     Checking nix v0.26.4
[INFO] [stderr]     Checking rustc_version v0.4.0
[INFO] [stderr]     Checking directories v4.0.1
[INFO] [stderr]     Checking is-terminal v0.4.12
[INFO] [stderr]     Checking shell-escape v0.1.5
[INFO] [stderr]     Checking shell-words v1.1.0
[INFO] [stderr]    Compiling crossbeam-utils v0.8.19
[INFO] [stderr]     Checking const-sha1 v0.2.0
[INFO] [stderr]     Checking aho-corasick v1.1.3
[INFO] [stderr]     Checking same-file v1.0.6
[INFO] [stderr]     Checking tempfile v3.10.1
[INFO] [stderr]     Checking which v4.4.2
[INFO] [stderr]     Checking regex-syntax v0.8.3
[INFO] [stderr]     Checking walkdir v2.5.0
[INFO] [stderr]    Compiling autocfg v1.2.0
[INFO] [stderr]     Checking bstr v1.9.1
[INFO] [stderr]     Checking log v0.4.21
[INFO] [stderr]     Checking iana-time-zone v0.1.60
[INFO] [stderr]     Checking wildmatch v2.3.3
[INFO] [stderr]     Checking crossbeam-epoch v0.9.18
[INFO] [stderr]    Compiling num-traits v0.2.18
[INFO] [stderr]     Checking crossbeam-deque v0.8.5
[INFO] [stderr]    Compiling serde_derive v1.0.199
[INFO] [stderr]    Compiling clap_derive v4.5.4
[INFO] [stderr]    Compiling thiserror-impl v1.0.59
[INFO] [stderr]     Checking color-eyre v0.6.3
[INFO] [stderr]     Checking chrono v0.4.38
[INFO] [stderr]     Checking regex-automata v0.4.6
[INFO] [stderr]     Checking clap v4.5.4
[INFO] [stderr]     Checking globset v0.4.14
[INFO] [stderr]     Checking regex v1.10.4
[INFO] [stderr]     Checking ignore v0.4.22
[INFO] [stderr]     Checking serde_spanned v0.6.5
[INFO] [stderr]     Checking toml_datetime v0.6.5
[INFO] [stderr]     Checking serde_ignored v0.1.10
[INFO] [stderr]     Checking toml_edit v0.19.15
[INFO] [stderr]     Checking toml v0.7.8
[INFO] [stdout] warning: unexpected `cfg` condition name: `cross_sandboxed`
[INFO] [stdout]     --> src/docker/shared.rs:1755:20
[INFO] [stdout]      |
[INFO] [stdout] 1755 |         #[cfg_attr(cross_sandboxed, ignore)]
[INFO] [stdout]      |                    ^^^^^^^^^^^^^^^
[INFO] [stdout]      |
[INFO] [stdout]      = help: expected names are: `docsrs`, `feature`, and `test` and 31 more
[INFO] [stdout]      = help: consider using a Cargo feature instead
[INFO] [stdout]      = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint:
[INFO] [stdout]               [lints.rust]
[INFO] [stdout]               unexpected_cfgs = { level = "warn", check-cfg = ['cfg(cross_sandboxed)'] }
[INFO] [stdout]      = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(cross_sandboxed)");` to the top of the `build.rs`
[INFO] [stdout]      = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]      = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/local.rs:168:34
[INFO] [stdout]     |
[INFO] [stdout] 168 |     let is_terminated = unsafe { crate::errors::TERMINATED.load(Ordering::SeqCst) };
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:573:17
[INFO] [stdout]     |
[INFO] [stdout] 573 |             if !CHILD_CONTAINER.exists.swap(true, Ordering::SeqCst) {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:597:18
[INFO] [stdout]     |
[INFO] [stdout] 597 |         unsafe { CHILD_CONTAINER.exists() }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:609:13
[INFO] [stdout]     |
[INFO] [stdout] 609 |             CHILD_CONTAINER.exit();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:635:13
[INFO] [stdout]     |
[INFO] [stdout] 635 |             CHILD_CONTAINER.finish(is_tty, msg_info);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/errors.rs:27:9
[INFO] [stdout]    |
[INFO] [stdout] 27 |     if !TERMINATED.swap(true, Ordering::SeqCst) && temp::has_tempfiles() {
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/errors.rs:105:5
[INFO] [stdout]     |
[INFO] [stdout] 105 |     docker::CHILD_CONTAINER.terminate();
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:22:15
[INFO] [stdout]    |
[INFO] [stdout] 22 |     unsafe { !FILES.is_empty() || !DIRS.is_empty() }
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:22:36
[INFO] [stdout]    |
[INFO] [stdout] 22 |     unsafe { !FILES.is_empty() || !DIRS.is_empty() }
[INFO] [stdout]    |                                    ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:31:5
[INFO] [stdout]    |
[INFO] [stdout] 31 |     FILES.clear();
[INFO] [stdout]    |     ^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:32:5
[INFO] [stdout]    |
[INFO] [stdout] 32 |     DIRS.clear();
[INFO] [stdout]    |     ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     FILES.push(file);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:42:8
[INFO] [stdout]    |
[INFO] [stdout] 42 |     Ok(FILES.last_mut().expect("file list should not be empty"))
[INFO] [stdout]    |        ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:48:5
[INFO] [stdout]    |
[INFO] [stdout] 48 |     FILES.pop()
[INFO] [stdout]    |     ^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:90:5
[INFO] [stdout]    |
[INFO] [stdout] 90 |     DIRS.push(dir);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:91:8
[INFO] [stdout]    |
[INFO] [stdout] 91 |     Ok(DIRS.last().expect("should not be empty").path())
[INFO] [stdout]    |        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:97:5
[INFO] [stdout]    |
[INFO] [stdout] 97 |     DIRS.pop()
[INFO] [stdout]    |     ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Checking xtask v0.0.0-dev.0 (/opt/rustwide/workdir/xtask)
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/local.rs:168:34
[INFO] [stdout]     |
[INFO] [stdout] 168 |     let is_terminated = unsafe { crate::errors::TERMINATED.load(Ordering::SeqCst) };
[INFO] [stdout]     |                                  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout]     = note: `#[warn(static_mut_refs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:573:17
[INFO] [stdout]     |
[INFO] [stdout] 573 |             if !CHILD_CONTAINER.exists.swap(true, Ordering::SeqCst) {
[INFO] [stdout]     |                 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:597:18
[INFO] [stdout]     |
[INFO] [stdout] 597 |         unsafe { CHILD_CONTAINER.exists() }
[INFO] [stdout]     |                  ^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:609:13
[INFO] [stdout]     |
[INFO] [stdout] 609 |             CHILD_CONTAINER.exit();
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/docker/shared.rs:635:13
[INFO] [stdout]     |
[INFO] [stdout] 635 |             CHILD_CONTAINER.finish(is_tty, msg_info);
[INFO] [stdout]     |             ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/errors.rs:27:9
[INFO] [stdout]    |
[INFO] [stdout] 27 |     if !TERMINATED.swap(true, Ordering::SeqCst) && temp::has_tempfiles() {
[INFO] [stdout]    |         ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]    --> src/errors.rs:105:5
[INFO] [stdout]     |
[INFO] [stdout] 105 |     docker::CHILD_CONTAINER.terminate();
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]     |
[INFO] [stdout]     = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]     = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:22:15
[INFO] [stdout]    |
[INFO] [stdout] 22 |     unsafe { !FILES.is_empty() || !DIRS.is_empty() }
[INFO] [stdout]    |               ^^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:22:36
[INFO] [stdout]    |
[INFO] [stdout] 22 |     unsafe { !FILES.is_empty() || !DIRS.is_empty() }
[INFO] [stdout]    |                                    ^^^^^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:31:5
[INFO] [stdout]    |
[INFO] [stdout] 31 |     FILES.clear();
[INFO] [stdout]    |     ^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:32:5
[INFO] [stdout]    |
[INFO] [stdout] 32 |     DIRS.clear();
[INFO] [stdout]    |     ^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:41:5
[INFO] [stdout]    |
[INFO] [stdout] 41 |     FILES.push(file);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:42:8
[INFO] [stdout]    |
[INFO] [stdout] 42 |     Ok(FILES.last_mut().expect("file list should not be empty"))
[INFO] [stdout]    |        ^^^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:48:5
[INFO] [stdout]    |
[INFO] [stdout] 48 |     FILES.pop()
[INFO] [stdout]    |     ^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:90:5
[INFO] [stdout]    |
[INFO] [stdout] 90 |     DIRS.push(dir);
[INFO] [stdout]    |     ^^^^^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a shared reference to mutable static
[INFO] [stdout]   --> src/temp.rs:91:8
[INFO] [stdout]    |
[INFO] [stdout] 91 |     Ok(DIRS.last().expect("should not be empty").path())
[INFO] [stdout]    |        ^^^^^^^^^^^ shared reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: shared references to mutable statics are dangerous; it's undefined behavior if the static is mutated or if a mutable reference is created for it while the shared reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: creating a mutable reference to mutable static
[INFO] [stdout]   --> src/temp.rs:97:5
[INFO] [stdout]    |
[INFO] [stdout] 97 |     DIRS.pop()
[INFO] [stdout]    |     ^^^^^^^^^^ mutable reference to mutable static
[INFO] [stdout]    |
[INFO] [stdout]    = note: for more information, see <https://doc.rust-lang.org/nightly/edition-guide/rust-2024/static-mut-references.html>
[INFO] [stdout]    = note: mutable references to mutable statics are dangerous; it's undefined behavior if any other pointer to the static is used or if any other reference is created for the static while the mutable reference lives
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 41.46s
[INFO] running `Command { std: "docker" "inspect" "747e254e8e1aae92952d5fdd933e1a7a962ac66638383001997177d494ab0cfc", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "747e254e8e1aae92952d5fdd933e1a7a962ac66638383001997177d494ab0cfc", kill_on_drop: false }`
[INFO] [stdout] 747e254e8e1aae92952d5fdd933e1a7a962ac66638383001997177d494ab0cfc
