[INFO] cloning repository https://github.com/trvon/pcap-sleuth
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/trvon/pcap-sleuth" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 33b60bc7d5189e9a2f05ad53139266f2a32708f0
[INFO] testing trvon/pcap-sleuth against master#733b47ea4b1b86216f14ef56e49440c33933f230+rustflags=-Copt-level=3 for pr-138759
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Ftrvon%2Fpcap-sleuth" "/workspace/builds/worker-2-tc2/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-2-tc2/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/trvon/pcap-sleuth
[INFO] finished tweaking git repo https://github.com/trvon/pcap-sleuth
[INFO] tweaked toml for git repo https://github.com/trvon/pcap-sleuth written to /workspace/builds/worker-2-tc2/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/trvon/pcap-sleuth on toolchain 733b47ea4b1b86216f14ef56e49440c33933f230
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/trvon/pcap-sleuth already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 928d767a175fc781fdf6e31cb58a79c026b7424fa277c1b83ba4cae4c92ede84
[INFO] running `Command { std: "docker" "start" "-a" "928d767a175fc781fdf6e31cb58a79c026b7424fa277c1b83ba4cae4c92ede84", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "928d767a175fc781fdf6e31cb58a79c026b7424fa277c1b83ba4cae4c92ede84", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "928d767a175fc781fdf6e31cb58a79c026b7424fa277c1b83ba4cae4c92ede84", kill_on_drop: false }`
[INFO] [stdout] 928d767a175fc781fdf6e31cb58a79c026b7424fa277c1b83ba4cae4c92ede84
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "build" "--frozen" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] b631fda729d2da01b40412aea2ef71edb6c335f1c8c632149240d886902643b9
[INFO] running `Command { std: "docker" "start" "-a" "b631fda729d2da01b40412aea2ef71edb6c335f1c8c632149240d886902643b9", kill_on_drop: false }`
[INFO] [stderr]    Compiling cfg-if v1.0.0
[INFO] [stderr]    Compiling pnet_base v0.34.0
[INFO] [stderr]    Compiling pnet v0.34.0
[INFO] [stderr]    Compiling winnow v0.7.7
[INFO] [stderr]    Compiling regex-automata v0.4.9
[INFO] [stderr]    Compiling indexmap v2.9.0
[INFO] [stderr]    Compiling log v0.4.27
[INFO] [stderr]    Compiling syn v2.0.100
[INFO] [stderr]    Compiling pnet_sys v0.34.0
[INFO] [stderr]    Compiling regex v1.11.1
[INFO] [stderr]    Compiling toml_write v0.1.0
[INFO] [stderr]    Compiling errno v0.2.8
[INFO] [stderr]    Compiling clap_builder v4.5.37
[INFO] [stderr]    Compiling csv-core v0.1.12
[INFO] [stderr]    Compiling jiff v0.2.10
[INFO] [stderr]    Compiling libloading v0.6.7
[INFO] [stderr]    Compiling pnet_macros_support v0.34.0
[INFO] [stderr]    Compiling env_filter v0.1.3
[INFO] [stderr]    Compiling env_logger v0.11.8
[INFO] [stderr]    Compiling pcap v1.3.0
[INFO] [stderr]    Compiling serde_derive v1.0.219
[INFO] [stderr]    Compiling pnet_macros v0.34.0
[INFO] [stderr]    Compiling clap_derive v4.5.32
[INFO] [stderr]    Compiling pnet_packet v0.34.0
[INFO] [stderr]    Compiling clap v4.5.37
[INFO] [stderr]    Compiling pnet_transport v0.34.0
[INFO] [stderr]    Compiling serde v1.0.219
[INFO] [stderr]    Compiling toml_datetime v0.6.9
[INFO] [stderr]    Compiling serde_spanned v0.6.8
[INFO] [stderr]    Compiling ipnetwork v0.20.0
[INFO] [stderr]    Compiling chrono v0.4.40
[INFO] [stderr]    Compiling serde_json v1.0.140
[INFO] [stderr]    Compiling csv v1.3.1
[INFO] [stderr]    Compiling pnet_datalink v0.34.0
[INFO] [stderr]    Compiling toml_edit v0.22.25
[INFO] [stderr]    Compiling toml v0.8.21
[INFO] [stderr]    Compiling pcap-sleuth v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `BufRead`
[INFO] [stdout]   --> src/main.rs:25:15
[INFO] [stdout]    |
[INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stdout]    |               ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `flow_data`
[INFO] [stdout]     --> src/main.rs:1378:15
[INFO] [stdout]      |
[INFO] [stdout] 1378 |     for (key, flow_data) in flows {
[INFO] [stdout]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stdout]     --> src/main.rs:1516:1
[INFO] [stdout]      |
[INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stdout] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stdout] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stdout] 1519 | |     config: &SuricataConfig,
[INFO] [stdout] 1520 | | ) -> usize {
[INFO] [stdout]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub`
[INFO] [stdout]      |
[INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(crate)`
[INFO] [stdout]     --> src/main.rs:435:1
[INFO] [stdout]      |
[INFO] [stdout] 435  | struct SuricataConfig {
[INFO] [stdout]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `SuricataAlert` is never constructed
[INFO] [stdout]    --> src/main.rs:312:5
[INFO] [stdout]     |
[INFO] [stdout] 305 | enum AttackType {
[INFO] [stdout]     |      ---------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 312 |     SuricataAlert,
[INFO] [stdout]     |     ^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 1m 58s
[INFO] running `Command { std: "docker" "inspect" "b631fda729d2da01b40412aea2ef71edb6c335f1c8c632149240d886902643b9", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "b631fda729d2da01b40412aea2ef71edb6c335f1c8c632149240d886902643b9", kill_on_drop: false }`
[INFO] [stdout] b631fda729d2da01b40412aea2ef71edb6c335f1c8c632149240d886902643b9
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "test" "--frozen" "--no-run" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] 542237b1153e97e5f3c6d68dd1fc072c9c8a316b65976c5c6e1466feeb519199
[INFO] running `Command { std: "docker" "start" "-a" "542237b1153e97e5f3c6d68dd1fc072c9c8a316b65976c5c6e1466feeb519199", kill_on_drop: false }`
[INFO] [stderr]    Compiling regex-automata v0.4.9
[INFO] [stderr]    Compiling libloading v0.6.7
[INFO] [stderr]    Compiling predicates-core v1.0.9
[INFO] [stderr]    Compiling rustix v1.0.5
[INFO] [stderr]    Compiling getrandom v0.3.2
[INFO] [stderr]    Compiling float-cmp v0.10.0
[INFO] [stderr]    Compiling assert_cmd v2.0.17
[INFO] [stderr]    Compiling bitflags v2.9.0
[INFO] [stderr]    Compiling termtree v0.5.1
[INFO] [stderr]    Compiling wait-timeout v0.2.1
[INFO] [stderr]    Compiling predicates-tree v1.0.12
[INFO] [stderr]    Compiling regex v1.11.1
[INFO] [stderr]    Compiling tempfile v3.19.1
[INFO] [stderr]    Compiling bstr v1.12.0
[INFO] [stderr]    Compiling env_filter v0.1.3
[INFO] [stderr]    Compiling predicates v3.1.3
[INFO] [stderr]    Compiling pnet_macros v0.34.0
[INFO] [stderr]    Compiling pcap v1.3.0
[INFO] [stderr]    Compiling env_logger v0.11.8
[INFO] [stderr]    Compiling pnet_packet v0.34.0
[INFO] [stderr]    Compiling pnet_transport v0.34.0
[INFO] [stderr]    Compiling pnet v0.34.0
[INFO] [stderr]    Compiling pcap-sleuth v0.1.0 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unused import: `BufRead`
[INFO] [stdout]   --> tests/../src/main.rs:25:15
[INFO] [stdout]    |
[INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stdout]    |               ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `BufRead`
[INFO] [stdout]   --> src/main.rs:25:15
[INFO] [stdout]    |
[INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stdout]    |               ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `BufRead`
[INFO] [stdout]   --> src/main.rs:25:15
[INFO] [stdout]    |
[INFO] [stdout] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stdout]    |               ^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `flow_data`
[INFO] [stdout]     --> tests/../src/main.rs:1378:15
[INFO] [stdout]      |
[INFO] [stdout] 1378 |     for (key, flow_data) in flows {
[INFO] [stdout]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `flow_data`
[INFO] [stdout]     --> src/main.rs:1378:15
[INFO] [stdout]      |
[INFO] [stdout] 1378 |     for (key, flow_data) in flows {
[INFO] [stdout]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused variable: `flow_data`
[INFO] [stdout]     --> src/main.rs:1378:15
[INFO] [stdout]      |
[INFO] [stdout] 1378 |     for (key, flow_data) in flows {
[INFO] [stdout]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stdout]      |
[INFO] [stdout]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stdout]     --> tests/../src/main.rs:1516:1
[INFO] [stdout]      |
[INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stdout] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stdout] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stdout] 1519 | |     config: &SuricataConfig,
[INFO] [stdout] 1520 | | ) -> usize {
[INFO] [stdout]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub(crate)`
[INFO] [stdout]      |
[INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(self)`
[INFO] [stdout]     --> tests/../src/main.rs:435:1
[INFO] [stdout]      |
[INFO] [stdout] 435  | struct SuricataConfig {
[INFO] [stdout]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `last_seen` and `packets` are never read
[INFO] [stdout]    --> tests/../src/main.rs:173:9
[INFO] [stdout]     |
[INFO] [stdout] 170 | pub struct FlowData {
[INFO] [stdout]     |            -------- fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 173 |     pub last_seen: DateTime<Utc>,
[INFO] [stdout]     |         ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 176 |     pub packets: Vec<PacketInfo>,
[INFO] [stdout]     |         ^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `FlowData` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `write_packet_csv` is never used
[INFO] [stdout]    --> tests/../src/main.rs:215:4
[INFO] [stdout]     |
[INFO] [stdout] 215 | fn write_packet_csv(packets: &[PacketInfo], output_path: &Path) -> Result<(), Box<dyn Error>> {
[INFO] [stdout]     |    ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `SourceStats` is never constructed
[INFO] [stdout]    --> tests/../src/main.rs:284:8
[INFO] [stdout]     |
[INFO] [stdout] 284 | struct SourceStats {
[INFO] [stdout]     |        ^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: enum `AttackType` is never used
[INFO] [stdout]    --> tests/../src/main.rs:305:6
[INFO] [stdout]     |
[INFO] [stdout] 305 | enum AttackType {
[INFO] [stdout]     |      ^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: method `to_string` is never used
[INFO] [stdout]    --> tests/../src/main.rs:316:8
[INFO] [stdout]     |
[INFO] [stdout] 315 | impl AttackType {
[INFO] [stdout]     | --------------- method in this implementation
[INFO] [stdout] 316 |     fn to_string(&self) -> String {
[INFO] [stdout]     |        ^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `detection`, `flow`, and `suricata` are never read
[INFO] [stdout]    --> tests/../src/main.rs:333:5
[INFO] [stdout]     |
[INFO] [stdout] 331 | struct Config {
[INFO] [stdout]     |        ------ fields in this struct
[INFO] [stdout] 332 |     #[serde(default)]
[INFO] [stdout] 333 |     detection: DetectionConfig,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout] 334 |     #[serde(default)]
[INFO] [stdout] 335 |     flow: FlowConfig,
[INFO] [stdout]     |     ^^^^
[INFO] [stdout] 336 |     #[serde(default)]
[INFO] [stdout] 337 |     suricata: SuricataConfig,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `Config` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `enabled`, `heuristics`, and `labels` are never read
[INFO] [stdout]    --> tests/../src/main.rs:344:5
[INFO] [stdout]     |
[INFO] [stdout] 342 | struct DetectionConfig {
[INFO] [stdout]     |        --------------- fields in this struct
[INFO] [stdout] 343 |     #[serde(default = "default_true")]
[INFO] [stdout] 344 |     enabled: bool,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 345 |     #[serde(default)]
[INFO] [stdout] 346 |     heuristics: HeuristicConfig,
[INFO] [stdout]     |     ^^^^^^^^^^
[INFO] [stdout] 347 |     #[serde(default)]
[INFO] [stdout] 348 |     labels: LabelConfig,
[INFO] [stdout]     |     ^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `DetectionConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `syn_scan`, `connect_scan`, `udp_scan`, `syn_flood`, `port_sweep`, and `ping_sweep` are never read
[INFO] [stdout]    --> tests/../src/main.rs:354:5
[INFO] [stdout]     |
[INFO] [stdout] 352 | struct HeuristicConfig {
[INFO] [stdout]     |        --------------- fields in this struct
[INFO] [stdout] 353 |     #[serde(default)]
[INFO] [stdout] 354 |     syn_scan: ScanConfig,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 355 |     #[serde(default)]
[INFO] [stdout] 356 |     connect_scan: ScanConfig,
[INFO] [stdout]     |     ^^^^^^^^^^^^
[INFO] [stdout] 357 |     #[serde(default)]
[INFO] [stdout] 358 |     udp_scan: ScanConfig,
[INFO] [stdout]     |     ^^^^^^^^
[INFO] [stdout] 359 |     #[serde(default)]
[INFO] [stdout] 360 |     syn_flood: SynFloodConfig,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout] 361 |     #[serde(default)]
[INFO] [stdout] 362 |     port_sweep: PortSweepConfig,
[INFO] [stdout]     |     ^^^^^^^^^^
[INFO] [stdout] 363 |     #[serde(default)]
[INFO] [stdout] 364 |     ping_sweep: ScanConfig,
[INFO] [stdout]     |     ^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `HeuristicConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `enabled` and `threshold` are never read
[INFO] [stdout]    --> tests/../src/main.rs:395:5
[INFO] [stdout]     |
[INFO] [stdout] 393 | struct ScanConfig {
[INFO] [stdout]     |        ---------- fields in this struct
[INFO] [stdout] 394 |     #[serde(default = "default_true")]
[INFO] [stdout] 395 |     enabled: bool,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 396 |     #[serde(default = "default_scan_threshold")]
[INFO] [stdout] 397 |     threshold: usize,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `ScanConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `enabled`, `rate_threshold`, and `time_window_secs` are never read
[INFO] [stdout]    --> tests/../src/main.rs:403:5
[INFO] [stdout]     |
[INFO] [stdout] 401 | struct SynFloodConfig {
[INFO] [stdout]     |        -------------- fields in this struct
[INFO] [stdout] 402 |     #[serde(default = "default_true")]
[INFO] [stdout] 403 |     enabled: bool,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 404 |     #[serde(default = "default_syn_flood_threshold")]
[INFO] [stdout] 405 |     rate_threshold: u32,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^
[INFO] [stdout] 406 |     #[serde(default = "default_syn_flood_window")]
[INFO] [stdout] 407 |     time_window_secs: u64,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `SynFloodConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `enabled` and `threshold` are never read
[INFO] [stdout]    --> tests/../src/main.rs:413:5
[INFO] [stdout]     |
[INFO] [stdout] 411 | struct PortSweepConfig {
[INFO] [stdout]     |        --------------- fields in this struct
[INFO] [stdout] 412 |     #[serde(default = "default_true")]
[INFO] [stdout] 413 |     enabled: bool,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout] 414 |     #[serde(default = "default_port_sweep_threshold")]
[INFO] [stdout] 415 |     threshold: usize,
[INFO] [stdout]     |     ^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `PortSweepConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `attack_format` is never read
[INFO] [stdout]    --> tests/../src/main.rs:421:5
[INFO] [stdout]     |
[INFO] [stdout] 419 | struct LabelConfig {
[INFO] [stdout]     |        ----------- field in this struct
[INFO] [stdout] 420 |     #[serde(default = "default_attack_label_format")]
[INFO] [stdout] 421 |     attack_format: String,
[INFO] [stdout]     |     ^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `LabelConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `tcp_timeout_secs`, `udp_timeout_secs`, and `check_interval` are never read
[INFO] [stdout]    --> tests/../src/main.rs:427:5
[INFO] [stdout]     |
[INFO] [stdout] 425 | struct FlowConfig {
[INFO] [stdout]     |        ---------- fields in this struct
[INFO] [stdout] 426 |     #[serde(default = "default_tcp_timeout")]
[INFO] [stdout] 427 |     tcp_timeout_secs: u64,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^
[INFO] [stdout] 428 |     #[serde(default = "default_udp_timeout")]
[INFO] [stdout] 429 |     udp_timeout_secs: u64,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^^^
[INFO] [stdout] 430 |     #[serde(default = "default_check_interval")]
[INFO] [stdout] 431 |     check_interval: u64,
[INFO] [stdout]     |     ^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `FlowConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `enabled` is never read
[INFO] [stdout]    --> tests/../src/main.rs:437:5
[INFO] [stdout]     |
[INFO] [stdout] 435 | struct SuricataConfig {
[INFO] [stdout]     |        -------------- field in this struct
[INFO] [stdout] 436 |     #[serde(default = "default_true")]
[INFO] [stdout] 437 |     enabled: bool,
[INFO] [stdout]     |     ^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `SuricataConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `parse_packet` is never used
[INFO] [stdout]    --> tests/../src/main.rs:505:4
[INFO] [stdout]     |
[INFO] [stdout] 505 | fn parse_packet(data: &[u8], ts: DateTime<Utc>, length: u32) -> PacketInfo {
[INFO] [stdout]     |    ^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `main` is never used
[INFO] [stdout]    --> tests/../src/main.rs:607:4
[INFO] [stdout]     |
[INFO] [stdout] 607 | fn main() -> Result<(), Box<dyn Error>> {
[INFO] [stdout]     |    ^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]    --> tests/../src/main.rs:921:12
[INFO] [stdout]     |
[INFO] [stdout] 921 |     FlowId(String),
[INFO] [stdout]     |     ------ ^^^^^^
[INFO] [stdout]     |     |
[INFO] [stdout]     |     field in this variant
[INFO] [stdout]     |
[INFO] [stdout]     = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]     |
[INFO] [stdout] 921 -     FlowId(String),
[INFO] [stdout] 921 +     FlowId(()),
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `0` is never read
[INFO] [stdout]    --> tests/../src/main.rs:922:12
[INFO] [stdout]     |
[INFO] [stdout] 922 |     Subnet(IpNetwork),
[INFO] [stdout]     |     ------ ^^^^^^^^^
[INFO] [stdout]     |     |
[INFO] [stdout]     |     field in this variant
[INFO] [stdout]     |
[INFO] [stdout]     = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stdout]     |
[INFO] [stdout] 922 -     Subnet(IpNetwork),
[INFO] [stdout] 922 +     Subnet(()),
[INFO] [stdout]     |
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `label` is never read
[INFO] [stdout]    --> tests/../src/main.rs:929:5
[INFO] [stdout]     |
[INFO] [stdout] 927 | struct LabelRule {
[INFO] [stdout]     |        --------- field in this struct
[INFO] [stdout] 928 |     rule: LabelType,
[INFO] [stdout] 929 |     label: String,
[INFO] [stdout]     |     ^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `LabelRule` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `run_attack_detection` is never used
[INFO] [stdout]     --> tests/../src/main.rs:1009:4
[INFO] [stdout]      |
[INFO] [stdout] 1009 | fn run_attack_detection(
[INFO] [stdout]      |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `protocol_for_ip_pair` is never used
[INFO] [stdout]     --> tests/../src/main.rs:1325:4
[INFO] [stdout]      |
[INFO] [stdout] 1325 | fn protocol_for_ip_pair(
[INFO] [stdout]      |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `find_flow_id_for_scan` is never used
[INFO] [stdout]     --> tests/../src/main.rs:1339:4
[INFO] [stdout]      |
[INFO] [stdout] 1339 | fn find_flow_id_for_scan(
[INFO] [stdout]      |    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `find_flow_id_for_service` is never used
[INFO] [stdout]     --> tests/../src/main.rs:1355:4
[INFO] [stdout]      |
[INFO] [stdout] 1355 | fn find_flow_id_for_service(
[INFO] [stdout]      |    ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: function `find_flow_id_for_ping` is never used
[INFO] [stdout]     --> tests/../src/main.rs:1373:4
[INFO] [stdout]      |
[INFO] [stdout] 1373 | fn find_flow_id_for_ping(
[INFO] [stdout]      |    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stdout]     --> src/main.rs:1516:1
[INFO] [stdout]      |
[INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stdout] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stdout] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stdout] 1519 | |     config: &SuricataConfig,
[INFO] [stdout] 1520 | | ) -> usize {
[INFO] [stdout]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub`
[INFO] [stdout]      |
[INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(crate)`
[INFO] [stdout]     --> src/main.rs:435:1
[INFO] [stdout]      |
[INFO] [stdout] 435  | struct SuricataConfig {
[INFO] [stdout]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `SuricataAlert` is never constructed
[INFO] [stdout]    --> src/main.rs:312:5
[INFO] [stdout]     |
[INFO] [stdout] 305 | enum AttackType {
[INFO] [stdout]     |      ---------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 312 |     SuricataAlert,
[INFO] [stdout]     |     ^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stdout]     --> src/main.rs:1516:1
[INFO] [stdout]      |
[INFO] [stdout] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stdout] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stdout] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stdout] 1519 | |     config: &SuricataConfig,
[INFO] [stdout] 1520 | | ) -> usize {
[INFO] [stdout]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub`
[INFO] [stdout]      |
[INFO] [stdout] note: but type `SuricataConfig` is only usable at visibility `pub(crate)`
[INFO] [stdout]     --> src/main.rs:435:1
[INFO] [stdout]      |
[INFO] [stdout] 435  | struct SuricataConfig {
[INFO] [stdout]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variant `SuricataAlert` is never constructed
[INFO] [stdout]    --> src/main.rs:312:5
[INFO] [stdout]     |
[INFO] [stdout] 305 | enum AttackType {
[INFO] [stdout]     |      ---------- variant in this enum
[INFO] [stdout] ...
[INFO] [stdout] 312 |     SuricataAlert,
[INFO] [stdout]     |     ^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout]     = note: `#[warn(dead_code)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 59.71s
[INFO] running `Command { std: "docker" "inspect" "542237b1153e97e5f3c6d68dd1fc072c9c8a316b65976c5c6e1466feeb519199", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "542237b1153e97e5f3c6d68dd1fc072c9c8a316b65976c5c6e1466feeb519199", kill_on_drop: false }`
[INFO] [stdout] 542237b1153e97e5f3c6d68dd1fc072c9c8a316b65976c5c6e1466feeb519199
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-2-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid -Copt-level=3" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:e90291280db7d1fac5b66fc6dad9f9662629e7365a55743daf9bdf73ebc4ea79" "/opt/rustwide/cargo-home/bin/cargo" "+733b47ea4b1b86216f14ef56e49440c33933f230" "test" "--frozen", kill_on_drop: false }`
[INFO] [stdout] caa2d643b10394909b6fdd7598c0f2536d97340812aeadbc48236c5e4a85b6d0
[INFO] running `Command { std: "docker" "start" "-a" "caa2d643b10394909b6fdd7598c0f2536d97340812aeadbc48236c5e4a85b6d0", kill_on_drop: false }`
[INFO] [stderr] warning: unused import: `BufRead`
[INFO] [stderr]   --> src/main.rs:25:15
[INFO] [stderr]    |
[INFO] [stderr] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stderr]    |               ^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `flow_data`
[INFO] [stderr]     --> src/main.rs:1378:15
[INFO] [stderr]      |
[INFO] [stderr] 1378 |     for (key, flow_data) in flows {
[INFO] [stderr]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stderr]      |
[INFO] [stderr]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stderr]     --> src/main.rs:1516:1
[INFO] [stderr]      |
[INFO] [stderr] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stderr] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stderr] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stderr] 1519 | |     config: &SuricataConfig,
[INFO] [stderr] 1520 | | ) -> usize {
[INFO] [stderr]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub`
[INFO] [stderr]      |
[INFO] [stderr] note: but type `SuricataConfig` is only usable at visibility `pub(crate)`
[INFO] [stderr]     --> src/main.rs:435:1
[INFO] [stderr]      |
[INFO] [stderr] 435  | struct SuricataConfig {
[INFO] [stderr]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: variant `SuricataAlert` is never constructed
[INFO] [stderr]    --> src/main.rs:312:5
[INFO] [stderr]     |
[INFO] [stderr] 305 | enum AttackType {
[INFO] [stderr]     |      ---------- variant in this enum
[INFO] [stderr] ...
[INFO] [stderr] 312 |     SuricataAlert,
[INFO] [stderr]     |     ^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `AttackType` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stderr]     = note: `#[warn(dead_code)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused import: `BufRead`
[INFO] [stderr]   --> tests/../src/main.rs:25:15
[INFO] [stderr]    |
[INFO] [stderr] 25 | use std::io::{BufRead, BufReader, Read};
[INFO] [stderr]    |               ^^^^^^^
[INFO] [stderr]    |
[INFO] [stderr]    = note: `#[warn(unused_imports)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: unused variable: `flow_data`
[INFO] [stderr]     --> tests/../src/main.rs:1378:15
[INFO] [stderr]      |
[INFO] [stderr] 1378 |     for (key, flow_data) in flows {
[INFO] [stderr]      |               ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_flow_data`
[INFO] [stderr]      |
[INFO] [stderr]      = note: `#[warn(unused_variables)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: type `SuricataConfig` is more private than the item `correlate_suricata_alerts`
[INFO] [stderr]     --> tests/../src/main.rs:1516:1
[INFO] [stderr]      |
[INFO] [stderr] 1516 | / pub fn correlate_suricata_alerts(
[INFO] [stderr] 1517 | |     flows: &mut HashMap<FlowKey, FlowData>,
[INFO] [stderr] 1518 | |     alerts: &[SuricataAlert],
[INFO] [stderr] 1519 | |     config: &SuricataConfig,
[INFO] [stderr] 1520 | | ) -> usize {
[INFO] [stderr]      | |__________^ function `correlate_suricata_alerts` is reachable at visibility `pub(crate)`
[INFO] [stderr]      |
[INFO] [stderr] note: but type `SuricataConfig` is only usable at visibility `pub(self)`
[INFO] [stderr]     --> tests/../src/main.rs:435:1
[INFO] [stderr]      |
[INFO] [stderr] 435  | struct SuricataConfig {
[INFO] [stderr]      | ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr]      = note: `#[warn(private_interfaces)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: fields `last_seen` and `packets` are never read
[INFO] [stderr]    --> tests/../src/main.rs:173:9
[INFO] [stderr]     |
[INFO] [stderr] 170 | pub struct FlowData {
[INFO] [stderr]     |            -------- fields in this struct
[INFO] [stderr] ...
[INFO] [stderr] 173 |     pub last_seen: DateTime<Utc>,
[INFO] [stderr]     |         ^^^^^^^^^
[INFO] [stderr] ...
[INFO] [stderr] 176 |     pub packets: Vec<PacketInfo>,
[INFO] [stderr]     |         ^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `FlowData` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stderr]     = note: `#[warn(dead_code)]` on by default
[INFO] [stderr] 
[INFO] [stderr] warning: function `write_packet_csv` is never used
[INFO] [stderr]    --> tests/../src/main.rs:215:4
[INFO] [stderr]     |
[INFO] [stderr] 215 | fn write_packet_csv(packets: &[PacketInfo], output_path: &Path) -> Result<(), Box<dyn Error>> {
[INFO] [stderr]     |    ^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: struct `SourceStats` is never constructed
[INFO] [stderr]    --> tests/../src/main.rs:284:8
[INFO] [stderr]     |
[INFO] [stderr] 284 | struct SourceStats {
[INFO] [stderr]     |        ^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: enum `AttackType` is never used
[INFO] [stderr]    --> tests/../src/main.rs:305:6
[INFO] [stderr]     |
[INFO] [stderr] 305 | enum AttackType {
[INFO] [stderr]     |      ^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: method `to_string` is never used
[INFO] [stderr]    --> tests/../src/main.rs:316:8
[INFO] [stderr]     |
[INFO] [stderr] 315 | impl AttackType {
[INFO] [stderr]     | --------------- method in this implementation
[INFO] [stderr] 316 |     fn to_string(&self) -> String {
[INFO] [stderr]     |        ^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: fields `detection`, `flow`, and `suricata` are never read
[INFO] [stderr]    --> tests/../src/main.rs:333:5
[INFO] [stderr]     |
[INFO] [stderr] 331 | struct Config {
[INFO] [stderr]     |        ------ fields in this struct
[INFO] [stderr] 332 |     #[serde(default)]
[INFO] [stderr] 333 |     detection: DetectionConfig,
[INFO] [stderr]     |     ^^^^^^^^^
[INFO] [stderr] 334 |     #[serde(default)]
[INFO] [stderr] 335 |     flow: FlowConfig,
[INFO] [stderr]     |     ^^^^
[INFO] [stderr] 336 |     #[serde(default)]
[INFO] [stderr] 337 |     suricata: SuricataConfig,
[INFO] [stderr]     |     ^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `Config` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `enabled`, `heuristics`, and `labels` are never read
[INFO] [stderr]    --> tests/../src/main.rs:344:5
[INFO] [stderr]     |
[INFO] [stderr] 342 | struct DetectionConfig {
[INFO] [stderr]     |        --------------- fields in this struct
[INFO] [stderr] 343 |     #[serde(default = "default_true")]
[INFO] [stderr] 344 |     enabled: bool,
[INFO] [stderr]     |     ^^^^^^^
[INFO] [stderr] 345 |     #[serde(default)]
[INFO] [stderr] 346 |     heuristics: HeuristicConfig,
[INFO] [stderr]     |     ^^^^^^^^^^
[INFO] [stderr] 347 |     #[serde(default)]
[INFO] [stderr] 348 |     labels: LabelConfig,
[INFO] [stderr]     |     ^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `DetectionConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `syn_scan`, `connect_scan`, `udp_scan`, `syn_flood`, `port_sweep`, and `ping_sweep` are never read
[INFO] [stderr]    --> tests/../src/main.rs:354:5
[INFO] [stderr]     |
[INFO] [stderr] 352 | struct HeuristicConfig {
[INFO] [stderr]     |        --------------- fields in this struct
[INFO] [stderr] 353 |     #[serde(default)]
[INFO] [stderr] 354 |     syn_scan: ScanConfig,
[INFO] [stderr]     |     ^^^^^^^^
[INFO] [stderr] 355 |     #[serde(default)]
[INFO] [stderr] 356 |     connect_scan: ScanConfig,
[INFO] [stderr]     |     ^^^^^^^^^^^^
[INFO] [stderr] 357 |     #[serde(default)]
[INFO] [stderr] 358 |     udp_scan: ScanConfig,
[INFO] [stderr]     |     ^^^^^^^^
[INFO] [stderr] 359 |     #[serde(default)]
[INFO] [stderr] 360 |     syn_flood: SynFloodConfig,
[INFO] [stderr]     |     ^^^^^^^^^
[INFO] [stderr] 361 |     #[serde(default)]
[INFO] [stderr] 362 |     port_sweep: PortSweepConfig,
[INFO] [stderr]     |     ^^^^^^^^^^
[INFO] [stderr] 363 |     #[serde(default)]
[INFO] [stderr] 364 |     ping_sweep: ScanConfig,
[INFO] [stderr]     |     ^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `HeuristicConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `enabled` and `threshold` are never read
[INFO] [stderr]    --> tests/../src/main.rs:395:5
[INFO] [stderr]     |
[INFO] [stderr] 393 | struct ScanConfig {
[INFO] [stderr]     |        ---------- fields in this struct
[INFO] [stderr] 394 |     #[serde(default = "default_true")]
[INFO] [stderr] 395 |     enabled: bool,
[INFO] [stderr]     |     ^^^^^^^
[INFO] [stderr] 396 |     #[serde(default = "default_scan_threshold")]
[INFO] [stderr] 397 |     threshold: usize,
[INFO] [stderr]     |     ^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `ScanConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `enabled`, `rate_threshold`, and `time_window_secs` are never read
[INFO] [stderr]    --> tests/../src/main.rs:403:5
[INFO] [stderr]     |
[INFO] [stderr] 401 | struct SynFloodConfig {
[INFO] [stderr]     |        -------------- fields in this struct
[INFO] [stderr] 402 |     #[serde(default = "default_true")]
[INFO] [stderr] 403 |     enabled: bool,
[INFO] [stderr]     |     ^^^^^^^
[INFO] [stderr] 404 |     #[serde(default = "default_syn_flood_threshold")]
[INFO] [stderr] 405 |     rate_threshold: u32,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^
[INFO] [stderr] 406 |     #[serde(default = "default_syn_flood_window")]
[INFO] [stderr] 407 |     time_window_secs: u64,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `SynFloodConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `enabled` and `threshold` are never read
[INFO] [stderr]    --> tests/../src/main.rs:413:5
[INFO] [stderr]     |
[INFO] [stderr] 411 | struct PortSweepConfig {
[INFO] [stderr]     |        --------------- fields in this struct
[INFO] [stderr] 412 |     #[serde(default = "default_true")]
[INFO] [stderr] 413 |     enabled: bool,
[INFO] [stderr]     |     ^^^^^^^
[INFO] [stderr] 414 |     #[serde(default = "default_port_sweep_threshold")]
[INFO] [stderr] 415 |     threshold: usize,
[INFO] [stderr]     |     ^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `PortSweepConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: field `attack_format` is never read
[INFO] [stderr]    --> tests/../src/main.rs:421:5
[INFO] [stderr]     |
[INFO] [stderr] 419 | struct LabelConfig {
[INFO] [stderr]     |        ----------- field in this struct
[INFO] [stderr] 420 |     #[serde(default = "default_attack_label_format")]
[INFO] [stderr] 421 |     attack_format: String,
[INFO] [stderr]     |     ^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `LabelConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: fields `tcp_timeout_secs`, `udp_timeout_secs`, and `check_interval` are never read
[INFO] [stderr]    --> tests/../src/main.rs:427:5
[INFO] [stderr]     |
[INFO] [stderr] 425 | struct FlowConfig {
[INFO] [stderr]     |        ---------- fields in this struct
[INFO] [stderr] 426 |     #[serde(default = "default_tcp_timeout")]
[INFO] [stderr] 427 |     tcp_timeout_secs: u64,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^
[INFO] [stderr] 428 |     #[serde(default = "default_udp_timeout")]
[INFO] [stderr] 429 |     udp_timeout_secs: u64,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^^^
[INFO] [stderr] 430 |     #[serde(default = "default_check_interval")]
[INFO] [stderr] 431 |     check_interval: u64,
[INFO] [stderr]     |     ^^^^^^^^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `FlowConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: field `enabled` is never read
[INFO] [stderr]    --> tests/../src/main.rs:437:5
[INFO] [stderr]     |
[INFO] [stderr] 435 | struct SuricataConfig {
[INFO] [stderr]     |        -------------- field in this struct
[INFO] [stderr] 436 |     #[serde(default = "default_true")]
[INFO] [stderr] 437 |     enabled: bool,
[INFO] [stderr]     |     ^^^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `SuricataConfig` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: function `parse_packet` is never used
[INFO] [stderr]    --> tests/../src/main.rs:505:4
[INFO] [stderr]     |
[INFO] [stderr] 505 | fn parse_packet(data: &[u8], ts: DateTime<Utc>, length: u32) -> PacketInfo {
[INFO] [stderr]     |    ^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `main` is never used
[INFO] [stderr]    --> tests/../src/main.rs:607:4
[INFO] [stderr]     |
[INFO] [stderr] 607 | fn main() -> Result<(), Box<dyn Error>> {
[INFO] [stderr]     |    ^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: field `0` is never read
[INFO] [stderr]    --> tests/../src/main.rs:921:12
[INFO] [stderr]     |
[INFO] [stderr] 921 |     FlowId(String),
[INFO] [stderr]     |     ------ ^^^^^^
[INFO] [stderr]     |     |
[INFO] [stderr]     |     field in this variant
[INFO] [stderr]     |
[INFO] [stderr]     = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stderr]     |
[INFO] [stderr] 921 -     FlowId(String),
[INFO] [stderr] 921 +     FlowId(()),
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: field `0` is never read
[INFO] [stderr]    --> tests/../src/main.rs:922:12
[INFO] [stderr]     |
[INFO] [stderr] 922 |     Subnet(IpNetwork),
[INFO] [stderr]     |     ------ ^^^^^^^^^
[INFO] [stderr]     |     |
[INFO] [stderr]     |     field in this variant
[INFO] [stderr]     |
[INFO] [stderr]     = note: `LabelType` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field
[INFO] [stderr]     |
[INFO] [stderr] 922 -     Subnet(IpNetwork),
[INFO] [stderr] 922 +     Subnet(()),
[INFO] [stderr]     |
[INFO] [stderr] 
[INFO] [stderr] warning: field `label` is never read
[INFO] [stderr]    --> tests/../src/main.rs:929:5
[INFO] [stderr]     |
[INFO] [stderr] 927 | struct LabelRule {
[INFO] [stderr]     |        --------- field in this struct
[INFO] [stderr] 928 |     rule: LabelType,
[INFO] [stderr] 929 |     label: String,
[INFO] [stderr]     |     ^^^^^
[INFO] [stderr]     |
[INFO] [stderr]     = note: `LabelRule` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis
[INFO] [stderr] 
[INFO] [stderr] warning: function `run_attack_detection` is never used
[INFO] [stderr]     --> tests/../src/main.rs:1009:4
[INFO] [stderr]      |
[INFO] [stderr] 1009 | fn run_attack_detection(
[INFO] [stderr]      |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `protocol_for_ip_pair` is never used
[INFO] [stderr]     --> tests/../src/main.rs:1325:4
[INFO] [stderr]      |
[INFO] [stderr] 1325 | fn protocol_for_ip_pair(
[INFO] [stderr]      |    ^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `find_flow_id_for_scan` is never used
[INFO] [stderr]     --> tests/../src/main.rs:1339:4
[INFO] [stderr]      |
[INFO] [stderr] 1339 | fn find_flow_id_for_scan(
[INFO] [stderr]      |    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `find_flow_id_for_service` is never used
[INFO] [stderr]     --> tests/../src/main.rs:1355:4
[INFO] [stderr]      |
[INFO] [stderr] 1355 | fn find_flow_id_for_service(
[INFO] [stderr]      |    ^^^^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: function `find_flow_id_for_ping` is never used
[INFO] [stderr]     --> tests/../src/main.rs:1373:4
[INFO] [stderr]      |
[INFO] [stderr] 1373 | fn find_flow_id_for_ping(
[INFO] [stderr]      |    ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stderr] 
[INFO] [stderr] warning: `pcap-sleuth` (bin "pcap-sleuth" test) generated 4 warnings
[INFO] [stderr] warning: `pcap-sleuth` (test "suricata_tests") generated 27 warnings
[INFO] [stderr] warning: `pcap-sleuth` (bin "pcap-sleuth") generated 4 warnings (4 duplicates)
[INFO] [stderr]     Finished `test` profile [unoptimized + debuginfo] target(s) in 0.14s
[INFO] [stderr]      Running unittests src/main.rs (/opt/rustwide/target/debug/deps/pcap_sleuth-fb0f2f8fcc2171e0)
[INFO] [stdout] 
[INFO] [stdout] running 3 tests
[INFO] [stdout] test tests::test_flowkey_canonicalization ... ok
[INFO] [stdout] test tests::test_parse_label_rules ... ok
[INFO] [stdout] test tests::test_write_flow_json ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 3 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s
[INFO] [stdout] 
[INFO] [stderr]      Running tests/cli_test.rs (/opt/rustwide/target/debug/deps/cli_test-297e6f48073f2a9a)
[INFO] [stdout] 
[INFO] [stdout] running 3 tests
[INFO] [stdout] test test_basic_cli_functionality ... ok
[INFO] [stdout] test test_json_output ... ok
[INFO] [stdout] test test_labels ... ok
[INFO] [stdout] 
[INFO] [stdout] test result: ok. 3 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.01s
[INFO] [stdout] 
[INFO] [stderr]      Running tests/suricata_tests.rs (/opt/rustwide/target/debug/deps/suricata_tests-b6e389cad1e90d6d)
[INFO] [stdout] 
[INFO] [stdout] running 6 tests
[INFO] [stdout] test main::tests::test_flowkey_canonicalization ... ok
[INFO] [stdout] test main::tests::test_write_flow_json ... ok
[INFO] [stdout] test test_parse_suricata_alerts ... ok
[INFO] [stdout] test test_correlate_alerts_with_flows ... ok
[INFO] [stdout] test main::tests::test_parse_label_rules ... ok
[INFO] [stdout] test test_large_file_performance ... FAILED
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout] 
[INFO] [stdout] ---- test_large_file_performance stdout ----
[INFO] [stdout] 
[INFO] [stdout] thread 'test_large_file_performance' panicked at tests/suricata_tests.rs:180:47:
[INFO] [stdout] Failed to write large file: Os { code: 30, kind: ReadOnlyFilesystem, message: "Read-only file system" }
[INFO] [stdout] stack backtrace:
[INFO] [stdout]    0:     0x61c7e795f2d2 - std::backtrace_rs::backtrace::libunwind::trace::h73a647620bf1c49d
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/../../backtrace/src/backtrace/libunwind.rs:117:9
[INFO] [stdout]    1:     0x61c7e795f2d2 - std::backtrace_rs::backtrace::trace_unsynchronized::hd4d513ed96cb3cb1
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/../../backtrace/src/backtrace/mod.rs:66:14
[INFO] [stdout]    2:     0x61c7e795f2d2 - std::sys::backtrace::_print_fmt::h61bb95f7476aafa5
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/backtrace.rs:66:9
[INFO] [stdout]    3:     0x61c7e795f2d2 - <std::sys::backtrace::BacktraceLock::print::DisplayBacktrace as core::fmt::Display>::fmt::ha2e7e3a01df69042
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/backtrace.rs:39:26
[INFO] [stdout]    4:     0x61c7e7986ac3 - core::fmt::rt::Argument::fmt::hf14163372f0f9a76
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/fmt/rt.rs:173:76
[INFO] [stdout]    5:     0x61c7e7986ac3 - core::fmt::write::h7cb8f63788cd01d2
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/fmt/mod.rs:1465:25
[INFO] [stdout]    6:     0x61c7e795bfc3 - std::io::default_write_fmt::h9ed739ccee8a150c
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/io/mod.rs:639:11
[INFO] [stdout]    7:     0x61c7e795bfc3 - std::io::Write::write_fmt::h1c0a32da913b32f1
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/io/mod.rs:1954:13
[INFO] [stdout]    8:     0x61c7e795f122 - std::sys::backtrace::BacktraceLock::print::h3ec4d7883eb25e61
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/backtrace.rs:42:9
[INFO] [stdout]    9:     0x61c7e79608ec - std::panicking::default_hook::{{closure}}::h29548987efd832cb
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:300:27
[INFO] [stdout]   10:     0x61c7e7960742 - std::panicking::default_hook::ha25170a15c643514
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:324:9
[INFO] [stdout]   11:     0x61c7e7914694 - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h562adeecbf43c420
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   12:     0x61c7e7914694 - test::test_main_with_exit_callback::{{closure}}::h97dd2a879d27e0e4
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:145:21
[INFO] [stdout]   13:     0x61c7e79612cb - <alloc::boxed::Box<F,A> as core::ops::function::Fn<Args>>::call::h7e85cbdbda26fdb7
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/alloc/src/boxed.rs:1985:9
[INFO] [stdout]   14:     0x61c7e79612cb - std::panicking::rust_panic_with_hook::h0d81afcd829aa24b
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:841:13
[INFO] [stdout]   15:     0x61c7e796109a - std::panicking::begin_panic_handler::{{closure}}::hc84a33f1202346cf
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:706:13
[INFO] [stdout]   16:     0x61c7e795f7c9 - std::sys::backtrace::__rust_end_short_backtrace::h373067a14f6c59aa
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/backtrace.rs:168:18
[INFO] [stdout]   17:     0x61c7e7960d2d - __rustc[beb0385846a06d21]::rust_begin_unwind
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:697:5
[INFO] [stdout]   18:     0x61c7e7985140 - core::panicking::panic_fmt::ha33fa2ae772efba9
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/panicking.rs:75:14
[INFO] [stdout]   19:     0x61c7e79854e6 - core::result::unwrap_failed::hfbbd3c78a73fea3d
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/result.rs:1761:5
[INFO] [stdout]   20:     0x61c7e78d7bb0 - core::result::Result<T,E>::expect::h28418d4beb31a902
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/result.rs:1119:23
[INFO] [stdout]   21:     0x61c7e78d7bb0 - suricata_tests::test_large_file_performance::h41a1a02d48ab799d
[INFO] [stdout]                                at /opt/rustwide/workdir/tests/suricata_tests.rs:180:47
[INFO] [stdout]   22:     0x61c7e78d7bb0 - suricata_tests::test_large_file_performance::{{closure}}::h3fc287be19e87041
[INFO] [stdout]                                at /opt/rustwide/workdir/tests/suricata_tests.rs:163:33
[INFO] [stdout]   23:     0x61c7e78d7bb0 - core::ops::function::FnOnce::call_once::h21286c6d451be9e5
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   24:     0x61c7e7919dcb - core::ops::function::FnOnce::call_once::hf84b9c3d864a6959
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   25:     0x61c7e7919dcb - test::__rust_begin_short_backtrace::h5724e31441c16fcb
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:648:18
[INFO] [stdout]   26:     0x61c7e791900e - test::run_test_in_process::{{closure}}::hbc28c9aa91793d7d
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:671:74
[INFO] [stdout]   27:     0x61c7e791900e - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::hc17b0e238c0f8f3e
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   28:     0x61c7e791900e - std::panicking::catch_unwind::do_call::hcdbce0d6dd6c83ce
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:589:40
[INFO] [stdout]   29:     0x61c7e791900e - std::panicking::catch_unwind::h9477967ceea044e8
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:552:19
[INFO] [stdout]   30:     0x61c7e791900e - std::panic::catch_unwind::h616a2e249da12e16
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panic.rs:359:14
[INFO] [stdout]   31:     0x61c7e791900e - test::run_test_in_process::h2758deb0f2e54430
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:671:27
[INFO] [stdout]   32:     0x61c7e791900e - test::run_test::{{closure}}::habe5cd2564b18aaa
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:592:43
[INFO] [stdout]   33:     0x61c7e78dcbb4 - test::run_test::{{closure}}::h9a0a6928f1a15421
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/test/src/lib.rs:622:41
[INFO] [stdout]   34:     0x61c7e78dcbb4 - std::sys::backtrace::__rust_begin_short_backtrace::hd68b5332434a22ca
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/backtrace.rs:152:18
[INFO] [stdout]   35:     0x61c7e78e055a - std::thread::Builder::spawn_unchecked_::{{closure}}::{{closure}}::h264ddcc3098eacae
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/thread/mod.rs:559:17
[INFO] [stdout]   36:     0x61c7e78e055a - <core::panic::unwind_safe::AssertUnwindSafe<F> as core::ops::function::FnOnce<()>>::call_once::h9fa39489749d6f3c
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/panic/unwind_safe.rs:272:9
[INFO] [stdout]   37:     0x61c7e78e055a - std::panicking::catch_unwind::do_call::hb9a1944b9f85100f
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:589:40
[INFO] [stdout]   38:     0x61c7e78e055a - std::panicking::catch_unwind::h0c6f100786c0dad8
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panicking.rs:552:19
[INFO] [stdout]   39:     0x61c7e78e055a - std::panic::catch_unwind::hf6084e2723385823
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/panic.rs:359:14
[INFO] [stdout]   40:     0x61c7e78e055a - std::thread::Builder::spawn_unchecked_::{{closure}}::hf0af58ce658143ad
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/thread/mod.rs:557:30
[INFO] [stdout]   41:     0x61c7e78e055a - core::ops::function::FnOnce::call_once{{vtable.shim}}::h88a14f9b2e79f9de
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/core/src/ops/function.rs:250:5
[INFO] [stdout]   42:     0x61c7e7964327 - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::hf31256ba38644b65
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/alloc/src/boxed.rs:1971:9
[INFO] [stdout]   43:     0x61c7e7964327 - <alloc::boxed::Box<F,A> as core::ops::function::FnOnce<Args>>::call_once::h100ad77f3448041b
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/alloc/src/boxed.rs:1971:9
[INFO] [stdout]   44:     0x61c7e7964327 - std::sys::pal::unix::thread::Thread::new::thread_start::h1a22ded422ce395b
[INFO] [stdout]                                at /rustc/733b47ea4b1b86216f14ef56e49440c33933f230/library/std/src/sys/pal/unix/thread.rs:97:17
[INFO] [stdout]   45:     0x7afa12cf5aa4 - <unknown>
[INFO] [stdout]   46:     0x7afa12d82a34 - clone
[INFO] [stdout]   47:                0x0 - <unknown>
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] failures:
[INFO] [stdout]     test_large_file_performance
[INFO] [stdout] 
[INFO] [stdout] test result: FAILED. 5 passed; 1 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.13s
[INFO] [stdout] 
[INFO] [stderr] error: test failed, to rerun pass `--test suricata_tests`
[INFO] running `Command { std: "docker" "inspect" "caa2d643b10394909b6fdd7598c0f2536d97340812aeadbc48236c5e4a85b6d0", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "caa2d643b10394909b6fdd7598c0f2536d97340812aeadbc48236c5e4a85b6d0", kill_on_drop: false }`
[INFO] [stdout] caa2d643b10394909b6fdd7598c0f2536d97340812aeadbc48236c5e4a85b6d0
