starting build "0745a018-9821-48c8-8d70-77b1a964aa1b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.68kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: ec67c84a6d76: Waiting Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 8bb7dd1116ca: Waiting Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 1fb4fb3d2b01: Waiting Step #1: 6becd2001539: Pulling fs layer Step #1: 22d4835417b0: Pulling fs layer Step #1: 601a9cbfd137: Pulling fs layer Step #1: a7d3a0578149: Waiting Step #1: 972df7da24e8: Pulling fs layer Step #1: 535ecd0613d1: Pulling fs layer Step #1: 23e3013e5b98: Waiting Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: c19b7fe83e8a: Pulling fs layer Step #1: c0d18e8fb1fa: Waiting Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: bcf869ca811e: Pulling fs layer Step #1: b46b6cdbb6f2: Waiting Step #1: 4a49dc7a9851: Pulling fs layer Step #1: de9ad109123c: Pulling fs layer Step #1: d74dccfeea37: Pulling fs layer Step #1: 29a663a40ba4: Waiting Step #1: 9650ce23f886: Pulling fs layer Step #1: 601a9cbfd137: Waiting Step #1: eaeb815cd75a: Pulling fs layer Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: 972df7da24e8: Waiting Step #1: 11c03f65d6c1: Pulling fs layer Step #1: 1eaaa1542342: Waiting Step #1: 535ecd0613d1: Waiting Step #1: 49c2287c71a0: Pulling fs layer Step #1: 6becd2001539: Waiting Step #1: 16949380c6e4: Waiting Step #1: d57e2535d3c0: Waiting Step #1: 22d4835417b0: Waiting Step #1: 4f27abcdaf5d: Waiting Step #1: 81adce140048: Waiting Step #1: e530a9eecf2b: Waiting Step #1: da4104990ff0: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: c19b7fe83e8a: Waiting Step #1: 9650ce23f886: Waiting Step #1: 3c6277aa8e2b: Waiting Step #1: eaeb815cd75a: Waiting Step #1: 49c2287c71a0: Waiting Step #1: bcf869ca811e: Waiting Step #1: d74dccfeea37: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: de9ad109123c: Waiting Step #1: 4a49dc7a9851: Waiting Step #1: 38da3118a46e: Verifying Checksum Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: 1fb4fb3d2b01: Verifying Checksum Step #1: 1fb4fb3d2b01: Download complete Step #1: 23e3013e5b98: Verifying Checksum Step #1: 23e3013e5b98: Download complete Step #1: 51df0d6876cd: Verifying Checksum Step #1: 51df0d6876cd: Download complete Step #1: 50e1ee57936a: Download complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: b549f31133a9: Pull complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: 81adce140048: Download complete Step #1: b46b6cdbb6f2: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Verifying Checksum Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Verifying Checksum Step #1: 535ecd0613d1: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: da4104990ff0: Download complete Step #1: c19b7fe83e8a: Verifying Checksum Step #1: c19b7fe83e8a: Download complete Step #1: 3c6277aa8e2b: Verifying Checksum Step #1: 3c6277aa8e2b: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: 9650ce23f886: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: eaeb815cd75a: Download complete Step #1: 3ccdc7b565ee: Download complete Step #1: 11c03f65d6c1: Verifying Checksum Step #1: 11c03f65d6c1: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 38da3118a46e: Pull complete Step #1: ec67c84a6d76: Pull complete Step #1: 49c2287c71a0: Verifying Checksum Step #1: 49c2287c71a0: Download complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: 49c2287c71a0: Pull complete Step #1: Digest: sha256:d197b1cd6ac57584187f882e55d98a10e12dec7a9bd66814f64c98346701dfb1 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 3146d6ba31f5 Step #1: Step 2/6 : RUN apt-get --yes update && apt-get install --no-install-recommends --yes libssl-dev pkg-config python && apt-get clean && rm --recursive --force /var/lib/apt/lists/* Step #1: ---> Running in 564c5db62456 Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 4s (29.8 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: libssl-dev is already the newest version (1.1.1f-1ubuntu2.23). Step #1: The following additional packages will be installed: Step #1: libglib2.0-0 libpython2-stdlib libpython2.7-minimal libpython2.7-stdlib Step #1: mime-support python2 python2-minimal python2.7 python2.7-minimal Step #1: Suggested packages: Step #1: python2-doc python-tk python2.7-doc binfmt-support Step #1: Recommended packages: Step #1: libglib2.0-data shared-mime-info xdg-user-dirs file Step #1: The following NEW packages will be installed: Step #1: libglib2.0-0 libpython2-stdlib libpython2.7-minimal libpython2.7-stdlib Step #1: mime-support pkg-config python-is-python2 python2 python2-minimal python2.7 Step #1: python2.7-minimal Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 5176 kB of archives. Step #1: After this operation, 20.9 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-minimal amd64 2.7.18-1~20.04.5 [336 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7-minimal amd64 2.7.18-1~20.04.5 [1276 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2-minimal amd64 2.7.17-2ubuntu4 [27.5 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libpython2.7-stdlib amd64 2.7.18-1~20.04.5 [1888 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 python2.7 amd64 2.7.18-1~20.04.5 [248 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/universe amd64 libpython2-stdlib amd64 2.7.17-2ubuntu4 [7072 B] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/universe amd64 python2 amd64 2.7.17-2ubuntu4 [26.5 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 python-is-python2 all 2.7.17-4 [2496 B] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 5176 kB in 3s (1620 kB/s) Step #1: Selecting previously unselected package libpython2.7-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libpython2.7-minimal_2.7.18-1~20.04.5_amd64.deb ... Step #1: Unpacking libpython2.7-minimal:amd64 (2.7.18-1~20.04.5) ... Step #1: Selecting previously unselected package python2.7-minimal. Step #1: Preparing to unpack .../1-python2.7-minimal_2.7.18-1~20.04.5_amd64.deb ... Step #1: Unpacking python2.7-minimal (2.7.18-1~20.04.5) ... Step #1: Selecting previously unselected package python2-minimal. Step #1: Preparing to unpack .../2-python2-minimal_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking python2-minimal (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../3-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libpython2.7-stdlib:amd64. Step #1: Preparing to unpack .../4-libpython2.7-stdlib_2.7.18-1~20.04.5_amd64.deb ... Step #1: Unpacking libpython2.7-stdlib:amd64 (2.7.18-1~20.04.5) ... Step #1: Selecting previously unselected package python2.7. Step #1: Preparing to unpack .../5-python2.7_2.7.18-1~20.04.5_amd64.deb ... Step #1: Unpacking python2.7 (2.7.18-1~20.04.5) ... Step #1: Selecting previously unselected package libpython2-stdlib:amd64. Step #1: Preparing to unpack .../6-libpython2-stdlib_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #1: Setting up libpython2.7-minimal:amd64 (2.7.18-1~20.04.5) ... Step #1: Setting up python2.7-minimal (2.7.18-1~20.04.5) ... Step #1: Setting up python2-minimal (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package python2. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18169 files and directories currently installed.) Step #1: Preparing to unpack .../python2_2.7.17-2ubuntu4_amd64.deb ... Step #1: Unpacking python2 (2.7.17-2ubuntu4) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Selecting previously unselected package python-is-python2. Step #1: Preparing to unpack .../python-is-python2_2.7.17-4_all.deb ... Step #1: Unpacking python-is-python2 (2.7.17-4) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libpython2.7-stdlib:amd64 (2.7.18-1~20.04.5) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up python2.7 (2.7.18-1~20.04.5) ... Step #1: Setting up libpython2-stdlib:amd64 (2.7.17-2ubuntu4) ... Step #1: Setting up python2 (2.7.17-2ubuntu4) ... Step #1: Setting up python-is-python2 (2.7.17-4) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 564c5db62456 Step #1: ---> 21e0f7c2ed3a Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/linkerd/linkerd2-proxy Step #1: ---> Running in cb64ac4f7dec Step #1: Cloning into 'linkerd2-proxy'... Step #1: Removing intermediate container cb64ac4f7dec Step #1: ---> aacfe218b14d Step #1: Step 4/6 : COPY build.sh $SRC/ Step #1: ---> c26c017466d4 Step #1: Step 5/6 : WORKDIR $SRC Step #1: ---> Running in 765dd711d219 Step #1: Removing intermediate container 765dd711d219 Step #1: ---> 3a57519a1613 Step #1: Step 6/6 : COPY rustc.py $SRC/ Step #1: ---> 1a75913b7203 Step #1: Successfully built 1a75913b7203 Step #1: Successfully tagged gcr.io/oss-fuzz/linkerd2-proxy:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/linkerd2-proxy Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileBoagHL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/linkerd2-proxy/.git Step #2 - "srcmap": + GIT_DIR=/src/linkerd2-proxy Step #2 - "srcmap": + cd /src/linkerd2-proxy Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/linkerd/linkerd2-proxy Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=4dc979fd31b7eefce76235c50d7a5f81de80b5f9 Step #2 - "srcmap": + jq_inplace /tmp/fileBoagHL '."/src/linkerd2-proxy" = { type: "git", url: "https://github.com/linkerd/linkerd2-proxy", rev: "4dc979fd31b7eefce76235c50d7a5f81de80b5f9" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filetRX8Qb Step #2 - "srcmap": + cat /tmp/fileBoagHL Step #2 - "srcmap": + jq '."/src/linkerd2-proxy" = { type: "git", url: "https://github.com/linkerd/linkerd2-proxy", rev: "4dc979fd31b7eefce76235c50d7a5f81de80b5f9" }' Step #2 - "srcmap": + mv /tmp/filetRX8Qb /tmp/fileBoagHL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileBoagHL Step #2 - "srcmap": + rm /tmp/fileBoagHL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/linkerd2-proxy": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/linkerd/linkerd2-proxy", Step #2 - "srcmap": "rev": "4dc979fd31b7eefce76235c50d7a5f81de80b5f9" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = coverage ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ -C debug-assertions=no' Step #3 - "compile-libfuzzer-coverage-x86_64": + RUSTFLAGS='--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ -C debug-assertions=no' Step #3 - "compile-libfuzzer-coverage-x86_64": + chmod +x /src/rustc.py Step #3 - "compile-libfuzzer-coverage-x86_64": + export RUSTC=/src/rustc.py Step #3 - "compile-libfuzzer-coverage-x86_64": + RUSTC=/src/rustc.py Step #3 - "compile-libfuzzer-coverage-x86_64": + export CFLAGS= Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS= Step #3 - "compile-libfuzzer-coverage-x86_64": + BUILD_FUZZER='cargo fuzz build ' Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGET_PATH=./fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-coverage-x86_64": + BASE=/src/linkerd2-proxy/linkerd Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/linkerd2-proxy/linkerd/app/inbound Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating git repository `https://github.com/linkerd/linkerd2-proxy-api.git` Step #3 - "compile-libfuzzer-coverage-x86_64":  Locking 329 packages to latest compatible versions Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding axum v0.6.20 (latest: v0.7.9) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding axum-core v0.3.4 (latest: v0.4.5) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding base64 v0.13.1 (latest: v0.22.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding base64 v0.21.7 (latest: v0.22.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding bitflags v1.3.2 (latest: v2.6.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding h2 v0.3.26 (latest: v0.4.7) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding hashbrown v0.12.3 (latest: v0.15.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding hermit-abi v0.3.9 (latest: v0.4.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding hostname v0.3.1 (latest: v0.4.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding http v0.2.12 (latest: v1.1.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding http-body v0.4.6 (latest: v1.0.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding hyper v0.14.31 (latest: v1.5.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding hyper-timeout v0.4.1 (latest: v0.5.2) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding idna v0.4.0 (latest: v1.0.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding indexmap v1.9.3 (latest: v2.6.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding itertools v0.12.1 (latest: v0.13.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding linux-raw-sys v0.4.14 (latest: v0.6.5) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding matchers v0.1.0 (latest: v0.2.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding matchit v0.7.3 (latest: v0.8.5) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding nu-ansi-term v0.46.0 (latest: v0.50.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding opentelemetry v0.26.0 (latest: v0.27.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding opentelemetry_sdk v0.26.0 (latest: v0.27.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding prost v0.12.6 (latest: v0.13.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding prost-derive v0.12.6 (latest: v0.13.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding prost-types v0.12.6 (latest: v0.13.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding quick-error v1.2.3 (latest: v2.0.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding regex-automata v0.1.10 (latest: v0.4.9) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding regex-syntax v0.6.29 (latest: v0.8.5) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding rustls v0.21.12 (latest: v0.23.17) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding rustls-pemfile v1.0.4 (latest: v2.2.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding rustls-webpki v0.101.7 (latest: v0.102.8) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding sync_wrapper v0.1.2 (latest: v1.0.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding thiserror v1.0.69 (latest: v2.0.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding thiserror-impl v1.0.69 (latest: v2.0.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding tokio-rustls v0.24.1 (latest: v0.26.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding tonic v0.10.2 (latest: v0.12.3) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding tower v0.4.13 (latest: v0.5.1) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.3+wasi-0.2.2) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding winreg v0.50.0 (latest: v0.52.0) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-coverage-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded adler32 v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ahash v0.8.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs-impl v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs-derive v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded asn1-rs v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke-derive v0.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anyhow v1.0.93 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-io v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded dtoa v1.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom-derive v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-task v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded heck v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded yoke v0.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded try-lock v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-project-lite v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing-log v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded write16 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing-serde v0.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded writeable v0.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded url v2.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing v0.1.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.215 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tonic v0.10.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-normalization v0.1.24 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_json v1.0.133 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded portable-atomic v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing-subscriber v0.3.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustls-webpki v0.101.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tower v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-util v0.7.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.87 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustls v0.21.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.6.29 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded procfs-core v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustix v0.38.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded opentelemetry_sdk v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-automata v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded idna v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rangemap v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded procfs v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sharded-slab v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hickory-proto v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.164 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-stream v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-rustls v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tinyvec v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-automata v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded spinning_top v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded socket2 v0.5.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded semver v1.0.23 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio v1.41.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sct v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_core v0.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded prost-derive v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded prost v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded prometheus-client v0.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parking_lot_core v0.9.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-test v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-io-timeout v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tinystr v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thread_local v1.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v1.0.69 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v1.0.69 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded stable_deref_trait v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded smallvec v1.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hyper v0.14.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing-attributes v0.1.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded synstructure v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded slab v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded signal-hook-registry v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustversion v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rusticata-macros v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itertools v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded prost-types v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-project v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parking_lot v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded idna v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded want v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tower-service v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tower-layer v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded sync_wrapper v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded simple_asn1 v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustls-pemfile v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded resolv-conf v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quick-error v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ppv-lite86 v0.2.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-project-internal v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded overload v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded oid-registry v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nonzero_ext v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec-derive v0.10.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-bidi v0.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tracing-core v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tokio-macros v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tinyvec_macros v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded prometheus-client-derive-encode v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerovec v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded mio v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded opentelemetry v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom v7.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded log v0.4.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ipnet v2.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_provider v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_properties v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locid v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hickory-resolver v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded percent-encoding v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nu-ansi-term v0.46.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy v0.7.35 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded x509-parser v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded litemap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded idna_adapter v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_normalizer_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locid_transform_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_locid_transform v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_collections v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded mime v0.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded matchers v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded match_cfg v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lru-cache v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded linked-hash-map v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded icu_provider_macros v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hyper-timeout v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded humantime v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded httpdate v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded httparse v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded http-body v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded http v0.2.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hostname v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded h2 v0.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded governor v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-util v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded errno v0.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded either v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded base64 v0.21.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded axum v0.6.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-stream-impl v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded matchit v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-timer v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-macro v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded deflate v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bytes v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded base64 v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-core v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-channel v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded drain v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded der-parser v9.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crc32fast v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-trait v0.1.83 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-executor v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded derive_arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded no-std-compat v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-stream v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerofrom v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded gzip-header v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-sink v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded form_urlencoded v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded data-encoding v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded enum-as-inner v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded axum-core v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ring v0.17.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-project-lite v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling smallvec v1.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-sink v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bytes v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parking_lot_core v0.9.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v1.0.69 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tower-service v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tower-layer v0.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling httparse v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling try-lock v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling httpdate v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling percent-encoding v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling stable_deref_trait v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustix v0.38.41 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hex v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-channel v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling want v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prometheus-client v0.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling procfs v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crc32fast v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling litemap v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling dtoa v1.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling writeable v0.5.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling adler32 v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing-core v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locid_transform_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.215 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_properties_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling write16 v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer_data v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anyhow v1.0.93 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling gzip-header v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf8_iter v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling utf16_iter v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling form_urlencoded v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base64 v0.21.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling mime v0.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling matchit v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sync_wrapper v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-errno v0.1.0 (/src/linkerd2-proxy/linkerd/errno) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling procfs-core v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ipnet v2.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data-encoding v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling http v0.2.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling deflate v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itertools v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tinyvec_macros v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-conditional v0.1.0 (/src/linkerd2-proxy/linkerd/conditional) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling slab v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v2.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tinyvec v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time-macros v0.2.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling oid-registry v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-pool v0.1.0 (/src/linkerd2-proxy/linkerd/pool) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-bidi v0.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling match_cfg v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom v7.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling heck v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quick-error v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linked-hash-map v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-h2 v0.1.0 (/src/linkerd2-proxy/linkerd/http/h2) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustls v0.21.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.6.29 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_json v1.0.133 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lru-cache v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling semver v1.0.23 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling overload v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling portable-atomic v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling http-body v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling socket2 v0.5.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling mio v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.87 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling signal-hook-registry v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hostname v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nu-ansi-term v0.46.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustls-pemfile v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sharded-slab v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parking_lot v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling resolv-conf v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_core v0.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-normalization v0.1.24 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing-log v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thread_local v1.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base64 v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tls-test-util v0.1.0 (/src/linkerd2-proxy/linkerd/tls/test-util) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling axum-core v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling axum v0.6.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spinning_top v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-timer v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nonzero_ext v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling no-std-compat v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-opaq-route v0.1.0 (/src/linkerd2-proxy/linkerd/opaq-route) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling humantime v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rangemap v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-app-core v0.1.0 (/src/linkerd2-proxy/linkerd/app/core) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-integer v0.1.46 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling idna v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-bigint v0.4.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-automata v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rusticata-macros v4.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-automata v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ring v0.17.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing-serde v0.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling matchers v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling synstructure v0.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sct v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustls-webpki v0.101.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-macro v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-macros v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing-attributes v0.1.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v1.0.69 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-project-internal v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-trait v0.1.83 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling displaydoc v0.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom-derive v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-stream-impl v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke-derive v0.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec-derive v0.10.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prometheus-client-derive-encode v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_provider_macros v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prost-derive v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs-derive v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs-impl v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling enum-as-inner v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling derive_arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-stream v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio v1.41.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-dns-name v0.1.0 (/src/linkerd2-proxy/linkerd/dns/name) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling asn1-rs v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling opentelemetry v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling simple_asn1 v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-project v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing v0.1.40 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-addr v0.1.0 (/src/linkerd2-proxy/linkerd/addr) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/addr/src/lib.rs:332:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 332 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ppv-lite86 v0.2.20 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-system v0.1.0 (/src/linkerd2-proxy/linkerd/system) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tracing-subscriber v0.3.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prost v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerofrom v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-addr` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling yoke v0.7.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prost-types v0.12.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerovec v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling der-parser v9.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling x509-parser v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tinystr v0.7.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_collections v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-executor v0.3.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling governor v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locid v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-error v0.1.0 (/src/linkerd2-proxy/linkerd/error) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling opentelemetry_sdk v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-classify v0.1.0 (/src/linkerd2-proxy/linkerd/http/classify) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_provider v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_locid_transform v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_properties v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-util v0.7.12 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-io-timeout v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-rustls v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-exp-backoff v0.1.0 (/src/linkerd2-proxy/linkerd/exp-backoff) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tracing v0.1.0 (/src/linkerd2-proxy/linkerd/tracing) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tower v0.4.13 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling h2 v0.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-stream v0.1.16 Step #3 - "compile-libfuzzer-coverage-x86_64": ['rustc', '--crate-name', 'tokio_util', '--edition=2021', '/rust/registry/src/index.crates.io-6f17d22bba15001f/tokio-util-0.7.12/src/lib.rs', '--error-format=json', '--json=diagnostic-rendered-ansi,artifacts,future-incompat', '--crate-type', 'lib', '--emit=dep-info,metadata,link', '-C', 'embed-bitcode=no', '-C', 'debuginfo=2', '--cfg', 'feature="codec"', '--cfg', 'feature="default"', '--cfg', 'feature="io"', '--check-cfg', 'cfg(docsrs)', '--check-cfg', 'cfg(feature, values("__docs_rs", "codec", "compat", "default", "full", "futures-io", "futures-util", "hashbrown", "io", "io-util", "net", "rt", "slab", "time", "tracing"))', '-C', 'metadata=31a20893f79f26d1', '-C', 'extra-filename=-31a20893f79f26d1', '--out-dir', '/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps', '-C', 'linker=clang', '-L', 'dependency=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps', '--extern', 'bytes=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libbytes-6a4c7ea0a880895d.rmeta', '--extern', 'futures_core=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libfutures_core-3267ce8fda4a14eb.rmeta', '--extern', 'futures_sink=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libfutures_sink-96446479240e3330.rmeta', '--extern', 'pin_project_lite=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libpin_project_lite-2633596a5f246a3b.rmeta', '--extern', 'tokio=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libtokio-37be49947c22e5d4.rmeta', '--cap-lints', 'allow', '--cfg', 'fuzzing', '-Cdebuginfo=1', '-Cforce-frame-pointers', '-Cinstrument-coverage', '-C', 'link-arg=-lc++', '-C', 'debug-assertions=no', '--remap-path-prefix', 'fuzz_targets=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/fuzz_targets', '-C', 'debug-assertions=no', '--remap-path-prefix', 'src=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/src'] Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tokio-test v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-io v0.1.0 (/src/linkerd2-proxy/linkerd/io) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-duplex v0.1.0 (/src/linkerd2-proxy/linkerd/duplex) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling icu_normalizer v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-stack v0.1.0 (/src/linkerd2-proxy/linkerd/stack) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-core v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/core) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling drain v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-resolve v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/resolve) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling idna_adapter v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling idna v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling url v2.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-balance-gauge-endpoints v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/balance/gauge-endpoints) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-box v0.1.0 (/src/linkerd2-proxy/linkerd/http/box) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-detect v0.1.0 (/src/linkerd2-proxy/linkerd/detect) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-trace-context v0.1.0 (/src/linkerd2-proxy/linkerd/trace-context) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-transport v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/transport) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-reconnect v0.1.0 (/src/linkerd2-proxy/linkerd/reconnect) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-stack-tracing v0.1.0 (/src/linkerd2-proxy/linkerd/stack/tracing) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-transport-header v0.1.0 (/src/linkerd2-proxy/linkerd/transport-header) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-idle-cache v0.1.0 (/src/linkerd2-proxy/linkerd/idle-cache) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-error-respond v0.1.0 (/src/linkerd2-proxy/linkerd/error-respond) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-router v0.1.0 (/src/linkerd2-proxy/linkerd/router) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/transport-header/src/lib.rs:277:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 277 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-transport-header` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hickory-proto v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hyper v0.14.31 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hickory-resolver v0.24.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-dns v0.1.0 (/src/linkerd2-proxy/linkerd/dns) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/dns/src/lib.rs:335:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 335 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-dns-resolve v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/dns-resolve) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-dns` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-metrics v0.1.0 (/src/linkerd2-proxy/linkerd/metrics) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hyper-timeout v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hyper-balance v0.1.0 (/src/linkerd2-proxy/hyper-balance) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-executor v0.1.0 (/src/linkerd2-proxy/linkerd/http/executor) Step #3 - "compile-libfuzzer-coverage-x86_64": ['rustc', '--crate-name', 'hyper', '--edition=2018', '/rust/registry/src/index.crates.io-6f17d22bba15001f/hyper-0.14.31/src/lib.rs', '--error-format=json', '--json=diagnostic-rendered-ansi,artifacts,future-incompat', '--crate-type', 'lib', '--emit=dep-info,metadata,link', '-C', 'embed-bitcode=no', '-C', 'debuginfo=2', '--cfg', 'feature="client"', '--cfg', 'feature="default"', '--cfg', 'feature="full"', '--cfg', 'feature="h2"', '--cfg', 'feature="http1"', '--cfg', 'feature="http2"', '--cfg', 'feature="runtime"', '--cfg', 'feature="server"', '--cfg', 'feature="socket2"', '--cfg', 'feature="stream"', '--cfg', 'feature="tcp"', '--check-cfg', 'cfg(docsrs)', '--check-cfg', 'cfg(feature, values("__internal_happy_eyeballs_tests", "backports", "client", "default", "deprecated", "ffi", "full", "h2", "http1", "http2", "libc", "nightly", "runtime", "server", "socket2", "stream", "tcp"))', '-C', 'metadata=92565b67b727c547', '-C', 'extra-filename=-92565b67b727c547', '--out-dir', '/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps', '-C', 'linker=clang', '-L', 'dependency=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps', '--extern', 'bytes=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libbytes-6a4c7ea0a880895d.rmeta', '--extern', 'futures_channel=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libfutures_channel-1411bf70963dfe9b.rmeta', '--extern', 'futures_core=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libfutures_core-3267ce8fda4a14eb.rmeta', '--extern', 'futures_util=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libfutures_util-8c5f70b5c7ccf6ad.rmeta', '--extern', 'h2=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libh2-0070874cfdfdd0df.rmeta', '--extern', 'http=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libhttp-97a25e6db0f40089.rmeta', '--extern', 'http_body=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libhttp_body-05665cfcfea503ff.rmeta', '--extern', 'httparse=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libhttparse-51f001110b5a7f34.rmeta', '--extern', 'httpdate=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libhttpdate-cec10d4fe91818dd.rmeta', '--extern', 'itoa=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libitoa-add5260810035b6e.rmeta', '--extern', 'pin_project_lite=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libpin_project_lite-2633596a5f246a3b.rmeta', '--extern', 'socket2=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libsocket2-bbd6eb128bc9f2ef.rmeta', '--extern', 'tokio=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libtokio-37be49947c22e5d4.rmeta', '--extern', 'tower_service=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libtower_service-44dbed632a843492.rmeta', '--extern', 'tracing=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libtracing-8951dff8c9ad78f5.rmeta', '--extern', 'want=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/libwant-e685d7a406130720.rmeta', '--cap-lints', 'allow', '--cfg', 'fuzzing', '-Cdebuginfo=1', '-Cforce-frame-pointers', '-Cinstrument-coverage', '-C', 'link-arg=-lc++', '-C', 'debug-assertions=no', '--remap-path-prefix', 'fuzz_targets=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/fuzz_targets', '-C', 'debug-assertions=no', '--remap-path-prefix', 'src=/src/linkerd2-proxy/linkerd/app/inbound/fuzz/src'] Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-identity v0.1.0 (/src/linkerd2-proxy/linkerd/identity) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-pool-p2c v0.1.0 (/src/linkerd2-proxy/linkerd/pool/p2c) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-balance-queue v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/balance/queue) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-transport-metrics v0.1.0 (/src/linkerd2-proxy/linkerd/transport-metrics) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-metrics v0.1.0 (/src/linkerd2-proxy/linkerd/http/metrics) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-stack-metrics v0.1.0 (/src/linkerd2-proxy/linkerd/stack/metrics) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tls v0.1.0 (/src/linkerd2-proxy/linkerd/tls) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-meshtls-verifier v0.1.0 (/src/linkerd2-proxy/linkerd/meshtls/verifier) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/tls/src/server.rs:346:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 346 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-balance v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/balance) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-meshtls-rustls v0.1.0 (/src/linkerd2-proxy/linkerd/meshtls/rustls) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tls-route v0.1.0 (/src/linkerd2-proxy/linkerd/tls/route) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-access-log v0.1.0 (/src/linkerd2-proxy/linkerd/http/access-log) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-tls` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-http v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/http) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-tcp v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/tcp) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/proxy/http/src/detect.rs:151:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 151 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-meshtls v0.1.0 (/src/linkerd2-proxy/linkerd/meshtls) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tonic v0.10.2 Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-proxy-http` (lib) generated 1 warning Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd2-proxy-api v0.14.0 (https://github.com/linkerd/linkerd2-proxy-api.git?branch=main#6c316cc4) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tonic-stream v0.1.0 (/src/linkerd2-proxy/linkerd/tonic-stream) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-tonic-watch v0.1.0 (/src/linkerd2-proxy/linkerd/tonic-watch) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling spiffe-proto v0.1.0 (/src/linkerd2-proxy/spiffe-proto) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling opentelemetry-proto v0.1.0 (/src/linkerd2-proxy/opentelemetry-proto) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling opencensus-proto v0.1.0 (/src/linkerd2-proxy/opencensus-proto) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-spire-client v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/spire-client) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-opentelemetry v0.1.0 (/src/linkerd2-proxy/linkerd/opentelemetry) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-opencensus v0.1.0 (/src/linkerd2-proxy/linkerd/opencensus) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-http-route v0.1.0 (/src/linkerd2-proxy/linkerd/http/route) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-api-resolve v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/api-resolve) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-identity-client v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/identity-client) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-tap v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/tap) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-service-profiles v0.1.0 (/src/linkerd2-proxy/linkerd/service-profiles) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-server-policy v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/server-policy) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-proxy-client-policy v0.1.0 (/src/linkerd2-proxy/linkerd/proxy/client-policy) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-app-test v0.1.0 (/src/linkerd2-proxy/linkerd/app/test) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-app-inbound v0.1.0 (/src/linkerd2-proxy/linkerd/app/inbound) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/src/lib.rs:18:40 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 18 | #[cfg(any(test, feature = "test-util", fuzzing))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/src/lib.rs:21:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 21 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/src/http.rs:13:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 13 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/src/policy.rs:106:21 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 106 |  #[cfg(any(test, fuzzing, feature = "test-util"))] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0063]: missing field `local_rate_limit` in initializer of `ServerPolicy` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/src/http.rs:212:17 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 212 |  policy::ServerPolicy { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ missing `local_rate_limit` Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": For more information about this error, try `rustc --explain E0063`. Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-app-inbound` (lib) generated 4 warnings Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linkerd-app-inbound-fuzz v0.0.0 (/src/linkerd2-proxy/linkerd/app/inbound/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64": error: extern location for linkerd_app_inbound does not exist: /src/linkerd2-proxy/linkerd/app/inbound/fuzz/target/debug/deps/liblinkerd_app_inbound-40256049c698d4d4.rlib Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/fuzz/fuzz_targets/fuzz_target_1.rs:4:34 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 4 | use {libfuzzer_sys::fuzz_target, linkerd_app_inbound::http_fuzz}; Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/fuzz/fuzz_targets/fuzz_target_1.rs:3:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 3 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unexpected `cfg` condition name: `fuzzing` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/linkerd2-proxy/linkerd/app/inbound/fuzz/fuzz_targets/fuzz_target_1.rs:6:7 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 6 | #[cfg(fuzzing)] Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-coverage-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-coverage-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing)'] } Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `linkerd-app-inbound-fuzz` (bin "fuzz_target_1") generated 2 warnings Step #3 - "compile-libfuzzer-coverage-x86_64":  Finished `dev` profile [unoptimized + debuginfo] target(s) in 42.59s Step #3 - "compile-libfuzzer-coverage-x86_64": + cp ./fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_target_1 /workspace/out/libfuzzer-coverage-x86_64/fuzz_inbound Step #3 - "compile-libfuzzer-coverage-x86_64": cp: cannot stat './fuzz/target/x86_64-unknown-linux-gnu/release/fuzz_target_1': No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image linkerd2-proxy Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 linkerd2-proxy Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1