[INFO] cloning repository https://github.com/sundarsub/sentra
[INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/sundarsub/sentra" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra", kill_on_drop: false }`
[INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra'...
[INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }`
[INFO] [stdout] 9c438974f70f2a3c0d820e3b7c99fb2021fe4c44
[INFO] checking sundarsub/sentra against try#1c4199da70f816f2239f41c55168ff75a3663718 for pr-155499
[INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fsundarsub%2Fsentra" "/workspace/builds/worker-4-tc2/source", kill_on_drop: false }`
[INFO] [stderr] Cloning into '/workspace/builds/worker-4-tc2/source'...
[INFO] [stderr] done.
[INFO] started tweaking git repo https://github.com/sundarsub/sentra
[INFO] finished tweaking git repo https://github.com/sundarsub/sentra
[INFO] tweaked toml for git repo https://github.com/sundarsub/sentra written to /workspace/builds/worker-4-tc2/source/Cargo.toml
[INFO] validating manifest of git repo https://github.com/sundarsub/sentra on toolchain 1c4199da70f816f2239f41c55168ff75a3663718
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1c4199da70f816f2239f41c55168ff75a3663718" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }`
[INFO] crate git repo https://github.com/sundarsub/sentra already has a lockfile, it will not be regenerated
[INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+1c4199da70f816f2239f41c55168ff75a3663718" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+1c4199da70f816f2239f41c55168ff75a3663718" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }`
[INFO] [stdout] 054e605d6d2fca9de7c927100ab66f7234d4676940e7767356357888d43b033a
[INFO] running `Command { std: "docker" "start" "-a" "054e605d6d2fca9de7c927100ab66f7234d4676940e7767356357888d43b033a", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "inspect" "054e605d6d2fca9de7c927100ab66f7234d4676940e7767356357888d43b033a", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "054e605d6d2fca9de7c927100ab66f7234d4676940e7767356357888d43b033a", kill_on_drop: false }`
[INFO] [stdout] 054e605d6d2fca9de7c927100ab66f7234d4676940e7767356357888d43b033a
[INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-4-tc2/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:d429b63d4308055ea97f60fb1d3dfca48854a00942f1bd2ad806beaf015945ec" "/opt/rustwide/cargo-home/bin/cargo" "+1c4199da70f816f2239f41c55168ff75a3663718" "check" "--frozen" "--all" "--all-targets" "--message-format=json", kill_on_drop: false }`
[INFO] [stdout] eb979d0f987df11f4c250e0b66244dce59e6d5b0ca673fc955eb67fc645044df
[INFO] running `Command { std: "docker" "start" "-a" "eb979d0f987df11f4c250e0b66244dce59e6d5b0ca673fc955eb67fc645044df", kill_on_drop: false }`
[INFO] [stderr]    Compiling libc v0.2.182
[INFO] [stderr]    Compiling quote v1.0.44
[INFO] [stderr]    Compiling rustix v1.1.3
[INFO] [stderr]     Checking memchr v2.8.0
[INFO] [stderr]     Checking bitflags v2.11.0
[INFO] [stderr]    Compiling getrandom v0.4.1
[INFO] [stderr]    Compiling serde_core v1.0.228
[INFO] [stderr]    Compiling serde v1.0.228
[INFO] [stderr]    Compiling nix v0.28.0
[INFO] [stderr]     Checking smallvec v1.15.1
[INFO] [stderr]    Compiling num-traits v0.2.19
[INFO] [stderr]     Checking generic-array v0.14.7
[INFO] [stderr]    Compiling libseccomp-sys v0.2.1
[INFO] [stderr]    Compiling libseccomp v0.3.0
[INFO] [stderr]     Checking clap_lex v1.0.0
[INFO] [stderr]     Checking log v0.4.29
[INFO] [stderr]     Checking regex-syntax v0.8.9
[INFO] [stderr]     Checking endian-type v0.1.2
[INFO] [stderr]     Checking unsafe-libyaml v0.2.11
[INFO] [stderr]     Checking clap_builder v4.5.60
[INFO] [stderr]     Checking colored v2.2.0
[INFO] [stderr]     Checking once_cell v1.21.3
[INFO] [stderr]     Checking nibble_vec v0.1.0
[INFO] [stderr]     Checking radix_trie v0.2.1
[INFO] [stderr]    Compiling syn v2.0.117
[INFO] [stderr]     Checking aho-corasick v1.1.4
[INFO] [stderr]     Checking crypto-common v0.1.7
[INFO] [stderr]     Checking block-buffer v0.10.4
[INFO] [stderr]     Checking digest v0.10.7
[INFO] [stderr]     Checking sha2 v0.10.9
[INFO] [stderr]     Checking regex-automata v0.4.14
[INFO] [stderr]     Checking errno v0.3.14
[INFO] [stderr]     Checking mio v1.1.1
[INFO] [stderr]     Checking socket2 v0.6.2
[INFO] [stderr]     Checking caps v0.5.6
[INFO] [stderr]     Checking hostname v0.4.2
[INFO] [stderr]     Checking sd-notify v0.4.5
[INFO] [stderr]     Checking users v0.11.0
[INFO] [stderr]     Checking signal-hook-registry v1.4.8
[INFO] [stderr]     Checking uuid v1.21.0
[INFO] [stderr]     Checking fd-lock v4.0.4
[INFO] [stderr]     Checking tempfile v3.25.0
[INFO] [stderr]     Checking serde_json v1.0.149
[INFO] [stderr]    Compiling serde_derive v1.0.228
[INFO] [stderr]    Compiling tokio-macros v2.6.0
[INFO] [stderr]    Compiling clap_derive v4.5.55
[INFO] [stderr]     Checking regex v1.12.3
[INFO] [stderr]     Checking rustyline v14.0.0
[INFO] [stderr]     Checking tokio v1.49.0
[INFO] [stderr]     Checking clap v4.5.60
[INFO] [stderr]     Checking serde_yaml v0.9.34+deprecated
[INFO] [stderr]     Checking chrono v0.4.43
[INFO] [stderr]     Checking execwall v2.0.1 (/opt/rustwide/workdir)
[INFO] [stdout] warning: unexpected `cfg` condition value: `caps`
[INFO] [stdout]    --> src/bin/python_runner.rs:234:11
[INFO] [stdout]     |
[INFO] [stdout] 234 |     #[cfg(feature = "caps")]
[INFO] [stdout]     |           ^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `caps` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::ffi::CString`
[INFO] [stdout]    --> src/bin/python_runner.rs:199:9
[INFO] [stdout]     |
[INFO] [stdout] 199 |     use std::ffi::CString;
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unexpected `cfg` condition value: `caps`
[INFO] [stdout]    --> src/bin/python_runner.rs:234:11
[INFO] [stdout]     |
[INFO] [stdout] 234 |     #[cfg(feature = "caps")]
[INFO] [stdout]     |           ^^^^^^^^^^^^^^^^ help: remove the condition
[INFO] [stdout]     |
[INFO] [stdout]     = note: no expected values for `feature`
[INFO] [stdout]     = help: consider adding `caps` as a feature in `Cargo.toml`
[INFO] [stdout]     = note: see <https://doc.rust-lang.org/nightly/rustc/check-cfg/cargo-specifics.html> for more information about checking conditional configuration
[INFO] [stdout]     = note: `#[warn(unexpected_cfgs)]` on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: unused import: `std::ffi::CString`
[INFO] [stdout]    --> src/bin/python_runner.rs:199:9
[INFO] [stdout]     |
[INFO] [stdout] 199 |     use std::ffi::CString;
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: variable does not need to be mutable
[INFO] [stdout]    --> tests/sandbox_integration.rs:766:9
[INFO] [stdout]     |
[INFO] [stdout] 766 |     let mut request1 = make_request(code);
[INFO] [stdout]     |         ----^^^^^^^^
[INFO] [stdout]     |         |
[INFO] [stdout]     |         help: remove this `mut`
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(unused_mut)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: enum `SandboxEvent` is never used
[INFO] [stdout]   --> src/audit.rs:13:10
[INFO] [stdout]    |
[INFO] [stdout] 13 | pub enum SandboxEvent {
[INFO] [stdout]    |          ^^^^^^^^^^^^
[INFO] [stdout]    |
[INFO] [stdout]    = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated items `new` and `with_truncation` are never used
[INFO] [stdout]   --> src/audit.rs:41:12
[INFO] [stdout]    |
[INFO] [stdout] 39 | impl SandboxMetrics {
[INFO] [stdout]    | ------------------- associated items in this implementation
[INFO] [stdout] 40 |     /// Create new sandbox metrics from execution data
[INFO] [stdout] 41 |     pub fn new(wall_time_ms: u64, peak_mem_mb: u64, timed_out: bool) -> Self {
[INFO] [stdout]    |            ^^^
[INFO] [stdout] ...
[INFO] [stdout] 52 |     pub fn with_truncation(mut self, stdout: bool, stderr: bool) -> Self {
[INFO] [stdout]    |            ^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: struct `SandboxAuditEntry` is never constructed
[INFO] [stdout]    --> src/audit.rs:119:12
[INFO] [stdout]     |
[INFO] [stdout] 119 | pub struct SandboxAuditEntry {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `write_sandbox_entry`, `log_sandbox_enter`, `log_sandbox_exit`, `log_sandbox_violation`, and `log_sandbox_execution` are never used
[INFO] [stdout]    --> src/audit.rs:332:8
[INFO] [stdout]     |
[INFO] [stdout] 157 | impl AuditLogger {
[INFO] [stdout]     | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 332 |     fn write_sandbox_entry(&self, entry: &SandboxAuditEntry) {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 344 |     pub fn log_sandbox_enter(&self, code_sha256: &str, profile: &str, details: Option<String>) {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 363 |     pub fn log_sandbox_exit(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 389 |     pub fn log_sandbox_violation(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 415 |     pub fn log_sandbox_execution(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `audit_mode` is never read
[INFO] [stdout]    --> src/policy.rs:236:9
[INFO] [stdout]     |
[INFO] [stdout] 228 | pub struct EvaluationResult {
[INFO] [stdout]     |            ---------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 236 |     pub audit_mode: bool,
[INFO] [stdout]     |         ^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `EvaluationResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `version`, `profiles`, `capabilities`, and `syscall_profiles` are never read
[INFO] [stdout]    --> src/policy.rs:297:9
[INFO] [stdout]     |
[INFO] [stdout] 293 | pub struct PolicyEngine {
[INFO] [stdout]     |            ------------ fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 297 |     pub version: String,
[INFO] [stdout]     |         ^^^^^^^
[INFO] [stdout] 298 |     /// v2.0: Sandbox profiles
[INFO] [stdout] 299 |     pub profiles: HashMap<String, SandboxProfile>,
[INFO] [stdout]     |         ^^^^^^^^
[INFO] [stdout] 300 |     /// v2.0: Capability definitions
[INFO] [stdout] 301 |     pub capabilities: HashMap<String, Capability>,
[INFO] [stdout]     |         ^^^^^^^^^^^^
[INFO] [stdout] 302 |     /// v2.0: Syscall profiles
[INFO] [stdout] 303 |     pub syscall_profiles: HashMap<String, SyscallProfile>,
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: associated items `from_yaml`, `evaluate`, `get_profile`, `get_capability`, `profile_count`, and `list_profiles` are never used
[INFO] [stdout]    --> src/policy.rs:395:12
[INFO] [stdout]     |
[INFO] [stdout] 319 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- associated items in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 395 |     pub fn from_yaml(yaml_content: &str) -> Result<Self, String> {
[INFO] [stdout]     |            ^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 405 |     pub fn evaluate(&self, command: &str) -> EvaluationResult {
[INFO] [stdout]     |            ^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 507 |     pub fn get_profile(&self, name: &str) -> Option<&SandboxProfile> {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 512 |     pub fn get_capability(&self, name: &str) -> Option<&Capability> {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 517 |     pub fn profile_count(&self) -> usize {
[INFO] [stdout]     |            ^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 522 |     pub fn list_profiles(&self) -> Vec<&str> {
[INFO] [stdout]     |            ^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `write_sandbox_entry`, `log_sandbox_enter`, `log_sandbox_exit`, `log_sandbox_violation`, and `log_sandbox_execution` are never used
[INFO] [stdout]    --> src/audit.rs:332:8
[INFO] [stdout]     |
[INFO] [stdout] 157 | impl AuditLogger {
[INFO] [stdout]     | ---------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 332 |     fn write_sandbox_entry(&self, entry: &SandboxAuditEntry) {
[INFO] [stdout]     |        ^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 344 |     pub fn log_sandbox_enter(&self, code_sha256: &str, profile: &str, details: Option<String>) {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 363 |     pub fn log_sandbox_exit(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 389 |     pub fn log_sandbox_violation(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 415 |     pub fn log_sandbox_execution(
[INFO] [stdout]     |            ^^^^^^^^^^^^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: field `audit_mode` is never read
[INFO] [stdout]    --> src/policy.rs:236:9
[INFO] [stdout]     |
[INFO] [stdout] 228 | pub struct EvaluationResult {
[INFO] [stdout]     |            ---------------- field in this struct
[INFO] [stdout] ...
[INFO] [stdout] 236 |     pub audit_mode: bool,
[INFO] [stdout]     |         ^^^^^^^^^^
[INFO] [stdout]     |
[INFO] [stdout]     = note: `EvaluationResult` has derived impls for the traits `Clone` and `Debug`, but these are intentionally ignored during dead code analysis
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: fields `version` and `syscall_profiles` are never read
[INFO] [stdout]    --> src/policy.rs:297:9
[INFO] [stdout]     |
[INFO] [stdout] 293 | pub struct PolicyEngine {
[INFO] [stdout]     |            ------------ fields in this struct
[INFO] [stdout] ...
[INFO] [stdout] 297 |     pub version: String,
[INFO] [stdout]     |         ^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 303 |     pub syscall_profiles: HashMap<String, SyscallProfile>,
[INFO] [stdout]     |         ^^^^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stdout] warning: methods `get_profile`, `get_capability`, `profile_count`, and `list_profiles` are never used
[INFO] [stdout]    --> src/policy.rs:507:12
[INFO] [stdout]     |
[INFO] [stdout] 319 | impl PolicyEngine {
[INFO] [stdout]     | ----------------- methods in this implementation
[INFO] [stdout] ...
[INFO] [stdout] 507 |     pub fn get_profile(&self, name: &str) -> Option<&SandboxProfile> {
[INFO] [stdout]     |            ^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 512 |     pub fn get_capability(&self, name: &str) -> Option<&Capability> {
[INFO] [stdout]     |            ^^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 517 |     pub fn profile_count(&self) -> usize {
[INFO] [stdout]     |            ^^^^^^^^^^^^^
[INFO] [stdout] ...
[INFO] [stdout] 522 |     pub fn list_profiles(&self) -> Vec<&str> {
[INFO] [stdout]     |            ^^^^^^^^^^^^^
[INFO] [stdout] 
[INFO] [stdout] 
[INFO] [stderr]     Finished `dev` profile [unoptimized + debuginfo] target(s) in 22.84s
[INFO] running `Command { std: "docker" "inspect" "eb979d0f987df11f4c250e0b66244dce59e6d5b0ca673fc955eb67fc645044df", kill_on_drop: false }`
[INFO] running `Command { std: "docker" "rm" "-f" "eb979d0f987df11f4c250e0b66244dce59e6d5b0ca673fc955eb67fc645044df", kill_on_drop: false }`
[INFO] [stdout] eb979d0f987df11f4c250e0b66244dce59e6d5b0ca673fc955eb67fc645044df
