[INFO] cloning repository https://github.com/thehackersbrain/hiddenpng [INFO] running `Command { std: "git" "-c" "credential.helper=" "-c" "credential.helper=/workspace/cargo-home/bin/git-credential-null" "clone" "--bare" "https://github.com/thehackersbrain/hiddenpng" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng", kill_on_drop: false }` [INFO] [stderr] Cloning into bare repository '/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng'... [INFO] running `Command { std: "git" "rev-parse" "HEAD", kill_on_drop: false }` [INFO] [stdout] e0b79fb04461432820464ce31f98c79d20c52399 [INFO] testing thehackersbrain/hiddenpng against try#8de4c7234dd9b97c9d76b58671343fdbbc9a433e+target=x86_64-unknown-linux-musl for musl_upgrade_1_2_5_in_2025-retry-1 [INFO] running `Command { std: "git" "clone" "/workspace/cache/git-repos/https%3A%2F%2Fgithub.com%2Fthehackersbrain%2Fhiddenpng" "/workspace/builds/worker-3-tc1/source", kill_on_drop: false }` [INFO] [stderr] Cloning into '/workspace/builds/worker-3-tc1/source'... [INFO] [stderr] done. [INFO] started tweaking git repo https://github.com/thehackersbrain/hiddenpng [INFO] finished tweaking git repo https://github.com/thehackersbrain/hiddenpng [INFO] tweaked toml for git repo https://github.com/thehackersbrain/hiddenpng written to /workspace/builds/worker-3-tc1/source/Cargo.toml [INFO] validating manifest of git repo https://github.com/thehackersbrain/hiddenpng on toolchain 8de4c7234dd9b97c9d76b58671343fdbbc9a433e [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--manifest-path" "Cargo.toml" "--no-deps", kill_on_drop: false }` [INFO] crate git repo https://github.com/thehackersbrain/hiddenpng already has a lockfile, it will not be regenerated [INFO] running `Command { std: CARGO_HOME="/workspace/cargo-home" RUSTUP_HOME="/workspace/rustup-home" "/workspace/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "fetch" "--manifest-path" "Cargo.toml", kill_on_drop: false }` [INFO] [stderr] Blocking waiting for file lock on package cache [INFO] [stderr] Downloading crates ... [INFO] [stderr] Downloaded block-padding v0.3.2 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "metadata" "--no-deps" "--format-version=1", kill_on_drop: false }` [INFO] [stdout] 77daaefa0dd9128623ae78a850de683fd4366fa3221c2ddce5dcd34126219aa4 [INFO] running `Command { std: "docker" "start" "-a" "77daaefa0dd9128623ae78a850de683fd4366fa3221c2ddce5dcd34126219aa4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "inspect" "77daaefa0dd9128623ae78a850de683fd4366fa3221c2ddce5dcd34126219aa4", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "77daaefa0dd9128623ae78a850de683fd4366fa3221c2ddce5dcd34126219aa4", kill_on_drop: false }` [INFO] [stdout] 77daaefa0dd9128623ae78a850de683fd4366fa3221c2ddce5dcd34126219aa4 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "build" "--frozen" "--message-format=json" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] a2921a6d2d9baf6469b8d2f40f0c35d78d8d256f32d1458e2dc4900730b9f4e6 [INFO] running `Command { std: "docker" "start" "-a" "a2921a6d2d9baf6469b8d2f40f0c35d78d8d256f32d1458e2dc4900730b9f4e6", kill_on_drop: false }` [INFO] [stderr] Compiling typenum v1.16.0 [INFO] [stderr] Compiling generic-array v0.14.6 [INFO] [stderr] Compiling libc v0.2.139 [INFO] [stderr] Compiling ppv-lite86 v0.2.17 [INFO] [stderr] Compiling cpufeatures v0.2.5 [INFO] [stderr] Compiling block-padding v0.2.1 [INFO] [stderr] Compiling opaque-debug v0.3.0 [INFO] [stderr] Compiling getrandom v0.2.8 [INFO] [stderr] Compiling rand_core v0.6.4 [INFO] [stderr] Compiling rand_chacha v0.3.1 [INFO] [stderr] Compiling rand v0.8.5 [INFO] [stderr] Compiling cipher v0.3.0 [INFO] [stderr] Compiling block-padding v0.3.2 [INFO] [stderr] Compiling aes v0.7.5 [INFO] [stderr] Compiling block-modes v0.8.1 [INFO] [stderr] Compiling hiddenpng v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `original_image_len` [INFO] [stdout] --> src/main.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | let original_image_len = image.len(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_image_len` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `data_len` [INFO] [stdout] --> src/main.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | let data_len = std::cmp::min(encrypted_data.len(), image.len()); [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_data_len` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 151 | let _ = hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | extract_data("demo.png", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 152 | let _ = extract_data("demo.png", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `dev` profile [unoptimized + debuginfo] target(s) in 6.98s [INFO] running `Command { std: "docker" "inspect" "a2921a6d2d9baf6469b8d2f40f0c35d78d8d256f32d1458e2dc4900730b9f4e6", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "a2921a6d2d9baf6469b8d2f40f0c35d78d8d256f32d1458e2dc4900730b9f4e6", kill_on_drop: false }` [INFO] [stdout] a2921a6d2d9baf6469b8d2f40f0c35d78d8d256f32d1458e2dc4900730b9f4e6 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "test" "--frozen" "--no-run" "--message-format=json" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] b4e8ca1d3a28b342453221161dff8a23cc6d143cf91d99c86138976cd8cf8879 [INFO] running `Command { std: "docker" "start" "-a" "b4e8ca1d3a28b342453221161dff8a23cc6d143cf91d99c86138976cd8cf8879", kill_on_drop: false }` [INFO] [stderr] Compiling hiddenpng v0.1.0 (/opt/rustwide/workdir) [INFO] [stdout] warning: unused variable: `original_image_len` [INFO] [stdout] --> src/main.rs:77:9 [INFO] [stdout] | [INFO] [stdout] 77 | let original_image_len = image.len(); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_image_len` [INFO] [stdout] | [INFO] [stdout] = note: `#[warn(unused_variables)]` on by default [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused variable: `data_len` [INFO] [stdout] --> src/main.rs:79:9 [INFO] [stdout] | [INFO] [stdout] 79 | let data_len = std::cmp::min(encrypted_data.len(), image.len()); [INFO] [stdout] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_data_len` [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:151:5 [INFO] [stdout] | [INFO] [stdout] 151 | hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] = note: `#[warn(unused_must_use)]` on by default [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 151 | let _ = hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stdout] warning: unused `Result` that must be used [INFO] [stdout] --> src/main.rs:152:5 [INFO] [stdout] | [INFO] [stdout] 152 | extract_data("demo.png", b"hacker"); [INFO] [stdout] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stdout] | [INFO] [stdout] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stdout] help: use `let _ = ...` to ignore the resulting value [INFO] [stdout] | [INFO] [stdout] 152 | let _ = extract_data("demo.png", b"hacker"); [INFO] [stdout] | +++++++ [INFO] [stdout] [INFO] [stdout] [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.52s [INFO] running `Command { std: "docker" "inspect" "b4e8ca1d3a28b342453221161dff8a23cc6d143cf91d99c86138976cd8cf8879", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "b4e8ca1d3a28b342453221161dff8a23cc6d143cf91d99c86138976cd8cf8879", kill_on_drop: false }` [INFO] [stdout] b4e8ca1d3a28b342453221161dff8a23cc6d143cf91d99c86138976cd8cf8879 [INFO] running `Command { std: "docker" "create" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/target:/opt/rustwide/target:rw,Z" "-v" "/var/lib/crater-agent-workspace/builds/worker-3-tc1/source:/opt/rustwide/workdir:ro,Z" "-v" "/var/lib/crater-agent-workspace/cargo-home:/opt/rustwide/cargo-home:ro,Z" "-v" "/var/lib/crater-agent-workspace/rustup-home:/opt/rustwide/rustup-home:ro,Z" "-e" "SOURCE_DIR=/opt/rustwide/workdir" "-e" "CARGO_TARGET_DIR=/opt/rustwide/target" "-e" "CARGO_INCREMENTAL=0" "-e" "RUST_BACKTRACE=full" "-e" "RUSTFLAGS=--cap-lints=forbid" "-e" "RUSTDOCFLAGS=--cap-lints=forbid" "-e" "CARGO_HOME=/opt/rustwide/cargo-home" "-e" "RUSTUP_HOME=/opt/rustwide/rustup-home" "-w" "/opt/rustwide/workdir" "-m" "1610612736" "--user" "0:0" "--network" "none" "ghcr.io/rust-lang/crates-build-env/linux@sha256:90999bfc7ae267e83380e433d8e61a7c072ca6729e92edbae886d3423b3a6f4c" "/opt/rustwide/cargo-home/bin/cargo" "+8de4c7234dd9b97c9d76b58671343fdbbc9a433e" "test" "--frozen" "--target" "x86_64-unknown-linux-musl", kill_on_drop: false }` [INFO] [stdout] bb39bd6d1f09c3c930f3298cfa4e703427425cc0acd7ee302aef6d1afdc84912 [INFO] running `Command { std: "docker" "start" "-a" "bb39bd6d1f09c3c930f3298cfa4e703427425cc0acd7ee302aef6d1afdc84912", kill_on_drop: false }` [INFO] [stderr] warning: unused variable: `original_image_len` [INFO] [stderr] --> src/main.rs:77:9 [INFO] [stderr] | [INFO] [stderr] 77 | let original_image_len = image.len(); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_original_image_len` [INFO] [stderr] | [INFO] [stderr] = note: `#[warn(unused_variables)]` on by default [INFO] [stderr] [INFO] [stderr] warning: unused variable: `data_len` [INFO] [stderr] --> src/main.rs:79:9 [INFO] [stderr] | [INFO] [stderr] 79 | let data_len = std::cmp::min(encrypted_data.len(), image.len()); [INFO] [stderr] | ^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_data_len` [INFO] [stderr] [INFO] [stderr] warning: unused `Result` that must be used [INFO] [stderr] --> src/main.rs:151:5 [INFO] [stderr] | [INFO] [stderr] 151 | hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] = note: `#[warn(unused_must_use)]` on by default [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 151 | let _ = hide_data("demo.png", b"secret message", b"hacker"); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: unused `Result` that must be used [INFO] [stderr] --> src/main.rs:152:5 [INFO] [stderr] | [INFO] [stderr] 152 | extract_data("demo.png", b"hacker"); [INFO] [stderr] | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ [INFO] [stderr] | [INFO] [stderr] = note: this `Result` may be an `Err` variant, which should be handled [INFO] [stderr] help: use `let _ = ...` to ignore the resulting value [INFO] [stderr] | [INFO] [stderr] 152 | let _ = extract_data("demo.png", b"hacker"); [INFO] [stderr] | +++++++ [INFO] [stderr] [INFO] [stderr] warning: `hiddenpng` (bin "hiddenpng" test) generated 4 warnings [INFO] [stderr] Finished `test` profile [unoptimized + debuginfo] target(s) in 0.05s [INFO] [stderr] Running unittests src/main.rs (/opt/rustwide/target/x86_64-unknown-linux-musl/debug/deps/hiddenpng-c28a2c5d85c4dce0) [INFO] [stdout] [INFO] [stdout] running 0 tests [INFO] [stdout] [INFO] [stdout] test result: ok. 0 passed; 0 failed; 0 ignored; 0 measured; 0 filtered out; finished in 0.00s [INFO] [stdout] [INFO] running `Command { std: "docker" "inspect" "bb39bd6d1f09c3c930f3298cfa4e703427425cc0acd7ee302aef6d1afdc84912", kill_on_drop: false }` [INFO] running `Command { std: "docker" "rm" "-f" "bb39bd6d1f09c3c930f3298cfa4e703427425cc0acd7ee302aef6d1afdc84912", kill_on_drop: false }` [INFO] [stdout] bb39bd6d1f09c3c930f3298cfa4e703427425cc0acd7ee302aef6d1afdc84912