starting build "3e826912-76ea-430c-a4e3-19205e348fc6" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: dd0bbb17640b: Pulling fs layer Step #1: 62275a527176: Pulling fs layer Step #1: 111633040162: Pulling fs layer Step #1: 5bf7dd58428c: Pulling fs layer Step #1: 632c9b314f45: Pulling fs layer Step #1: 8ae501891266: Pulling fs layer Step #1: 3058f8e90c86: Pulling fs layer Step #1: c377fa4fb781: Pulling fs layer Step #1: 2336eb300fb9: Pulling fs layer Step #1: 09429854c898: Pulling fs layer Step #1: 71af8faf61ed: Pulling fs layer Step #1: 687fd097ee80: Pulling fs layer Step #1: 7f1e63401161: Pulling fs layer Step #1: cf8b5802c762: Pulling fs layer Step #1: 0e6dab0925eb: Pulling fs layer Step #1: f4bced45a7b2: Pulling fs layer Step #1: 2707ad88823d: Pulling fs layer Step #1: af6705528e9c: Pulling fs layer Step #1: 111633040162: Waiting Step #1: 4e1005e0a6aa: Pulling fs layer Step #1: 118105242bd8: Pulling fs layer Step #1: 2aa39f787b87: Pulling fs layer Step #1: d3f87be3762e: Pulling fs layer Step #1: 3058f8e90c86: Waiting Step #1: 6fd806021fc2: Pulling fs layer Step #1: 5bf7dd58428c: Waiting Step #1: 632c9b314f45: Waiting Step #1: 9d856dc172cd: Pulling fs layer Step #1: 8ae501891266: Waiting Step #1: a987fc666fa1: Pulling fs layer Step #1: c377fa4fb781: Waiting Step #1: 233e05621483: Pulling fs layer Step #1: 2336eb300fb9: Waiting Step #1: 0d3facbb2d8c: Pulling fs layer Step #1: 09429854c898: Waiting Step #1: aa9066b95eb6: Pulling fs layer Step #1: 71af8faf61ed: Waiting Step #1: ff11ed875e6f: Pulling fs layer Step #1: 687fd097ee80: Waiting Step #1: 33f6a6d38c7e: Pulling fs layer Step #1: 4e1005e0a6aa: Waiting Step #1: af6705528e9c: Waiting Step #1: 7f1e63401161: Waiting Step #1: 5ecd2cf410de: Pulling fs layer Step #1: cf8b5802c762: Waiting Step #1: 702a45c3ae33: Pulling fs layer Step #1: 0e6dab0925eb: Waiting Step #1: df6fed191aed: Pulling fs layer Step #1: f4bced45a7b2: Waiting Step #1: 2707ad88823d: Waiting Step #1: e322f8b94d88: Pulling fs layer Step #1: 5ecd2cf410de: Waiting Step #1: 0d3facbb2d8c: Waiting Step #1: 702a45c3ae33: Waiting Step #1: aa9066b95eb6: Waiting Step #1: df6fed191aed: Waiting Step #1: ff11ed875e6f: Waiting Step #1: 118105242bd8: Waiting Step #1: e322f8b94d88: Waiting Step #1: 33f6a6d38c7e: Waiting Step #1: 2aa39f787b87: Waiting Step #1: 9d856dc172cd: Waiting Step #1: 233e05621483: Waiting Step #1: a987fc666fa1: Waiting Step #1: d3f87be3762e: Waiting Step #1: 6fd806021fc2: Waiting Step #1: 62275a527176: Verifying Checksum Step #1: 62275a527176: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 111633040162: Verifying Checksum Step #1: 111633040162: Download complete Step #1: 5bf7dd58428c: Verifying Checksum Step #1: 5bf7dd58428c: Download complete Step #1: 632c9b314f45: Download complete Step #1: 3058f8e90c86: Verifying Checksum Step #1: 3058f8e90c86: Download complete Step #1: dd0bbb17640b: Verifying Checksum Step #1: dd0bbb17640b: Download complete Step #1: c377fa4fb781: Verifying Checksum Step #1: c377fa4fb781: Download complete Step #1: b549f31133a9: Pull complete Step #1: 09429854c898: Verifying Checksum Step #1: 09429854c898: Download complete Step #1: 71af8faf61ed: Verifying Checksum Step #1: 71af8faf61ed: Download complete Step #1: 687fd097ee80: Download complete Step #1: 7f1e63401161: Verifying Checksum Step #1: cf8b5802c762: Verifying Checksum Step #1: cf8b5802c762: Download complete Step #1: 0e6dab0925eb: Verifying Checksum Step #1: 0e6dab0925eb: Download complete Step #1: 2336eb300fb9: Verifying Checksum Step #1: 2336eb300fb9: Download complete Step #1: f4bced45a7b2: Verifying Checksum Step #1: f4bced45a7b2: Download complete Step #1: 2707ad88823d: Verifying Checksum Step #1: 2707ad88823d: Download complete Step #1: af6705528e9c: Verifying Checksum Step #1: af6705528e9c: Download complete Step #1: 4e1005e0a6aa: Verifying Checksum Step #1: 4e1005e0a6aa: Download complete Step #1: 118105242bd8: Verifying Checksum Step #1: 118105242bd8: Download complete Step #1: 2aa39f787b87: Verifying Checksum Step #1: 2aa39f787b87: Download complete Step #1: d3f87be3762e: Verifying Checksum Step #1: d3f87be3762e: Download complete Step #1: 6fd806021fc2: Verifying Checksum Step #1: 6fd806021fc2: Download complete Step #1: 8ae501891266: Verifying Checksum Step #1: 8ae501891266: Download complete Step #1: 9d856dc172cd: Verifying Checksum Step #1: 9d856dc172cd: Download complete Step #1: a987fc666fa1: Verifying Checksum Step #1: a987fc666fa1: Download complete Step #1: 233e05621483: Verifying Checksum Step #1: 233e05621483: Download complete Step #1: 0d3facbb2d8c: Verifying Checksum Step #1: 0d3facbb2d8c: Download complete Step #1: aa9066b95eb6: Verifying Checksum Step #1: aa9066b95eb6: Download complete Step #1: 33f6a6d38c7e: Verifying Checksum Step #1: 33f6a6d38c7e: Download complete Step #1: ff11ed875e6f: Verifying Checksum Step #1: ff11ed875e6f: Download complete Step #1: 5ecd2cf410de: Verifying Checksum Step #1: 5ecd2cf410de: Download complete Step #1: 702a45c3ae33: Verifying Checksum Step #1: 702a45c3ae33: Download complete Step #1: df6fed191aed: Download complete Step #1: dd0bbb17640b: Pull complete Step #1: 62275a527176: Pull complete Step #1: 111633040162: Pull complete Step #1: 5bf7dd58428c: Pull complete Step #1: 632c9b314f45: Pull complete Step #1: e322f8b94d88: Verifying Checksum Step #1: e322f8b94d88: Download complete Step #1: 8ae501891266: Pull complete Step #1: 3058f8e90c86: Pull complete Step #1: c377fa4fb781: Pull complete Step #1: 2336eb300fb9: Pull complete Step #1: 09429854c898: Pull complete Step #1: 71af8faf61ed: Pull complete Step #1: 687fd097ee80: Pull complete Step #1: 7f1e63401161: Pull complete Step #1: cf8b5802c762: Pull complete Step #1: 0e6dab0925eb: Pull complete Step #1: f4bced45a7b2: Pull complete Step #1: 2707ad88823d: Pull complete Step #1: af6705528e9c: Pull complete Step #1: 4e1005e0a6aa: Pull complete Step #1: 118105242bd8: Pull complete Step #1: 2aa39f787b87: Pull complete Step #1: d3f87be3762e: Pull complete Step #1: 6fd806021fc2: Pull complete Step #1: 9d856dc172cd: Pull complete Step #1: a987fc666fa1: Pull complete Step #1: 233e05621483: Pull complete Step #1: 0d3facbb2d8c: Pull complete Step #1: aa9066b95eb6: Pull complete Step #1: ff11ed875e6f: Pull complete Step #1: 33f6a6d38c7e: Pull complete Step #1: 5ecd2cf410de: Pull complete Step #1: 702a45c3ae33: Pull complete Step #1: df6fed191aed: Pull complete Step #1: e322f8b94d88: Pull complete Step #1: Digest: sha256:defc8ca827fb14827b3bc0d63ae100bbab10dbd76ba16fbf1cdf373c9fb55216 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> c9a62ad2ae6b Step #1: Step 2/5 : RUN apt-get update && apt-get install -y nasm Step #1: ---> Running in 362be8b0edac Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (371 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following NEW packages will be installed: Step #1: nasm Step #1: 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 362 kB of archives. Step #1: After this operation, 3374 kB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 362 kB in 1s (474 kB/s) Step #1: Selecting previously unselected package nasm. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../nasm_2.14.02-1_amd64.deb ... Step #1: Unpacking nasm (2.14.02-1) ... Step #1: Setting up nasm (2.14.02-1) ... Step #1: Removing intermediate container 362be8b0edac Step #1: ---> 3a98eec67b02 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/intel/vtpm-td.git Step #1: ---> Running in f10dd67bdbec Step #1: Cloning into 'vtpm-td'... Step #1: Removing intermediate container f10dd67bdbec Step #1: ---> d94ce865b9c8 Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> 8cd7b3c86a6f Step #1: Step 5/5 : WORKDIR $SRC/vtpm-td Step #1: ---> Running in 2693f0833957 Step #1: Removing intermediate container 2693f0833957 Step #1: ---> f92d7e1b26e0 Step #1: Successfully built f92d7e1b26e0 Step #1: Successfully tagged gcr.io/oss-fuzz/vtpm-td:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/vtpm-td Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filenjGNLM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/vtpm-td/.git Step #2 - "srcmap": + GIT_DIR=/src/vtpm-td Step #2 - "srcmap": + cd /src/vtpm-td Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/intel/vtpm-td.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ad7cdf699c06a5c3d974fd8455e1017803a1dcc8 Step #2 - "srcmap": + jq_inplace /tmp/filenjGNLM '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "ad7cdf699c06a5c3d974fd8455e1017803a1dcc8" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileD1GjQ9 Step #2 - "srcmap": + cat /tmp/filenjGNLM Step #2 - "srcmap": + jq '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "ad7cdf699c06a5c3d974fd8455e1017803a1dcc8" }' Step #2 - "srcmap": + mv /tmp/fileD1GjQ9 /tmp/filenjGNLM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filenjGNLM Step #2 - "srcmap": + rm /tmp/filenjGNLM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/vtpm-td": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/intel/vtpm-td.git", Step #2 - "srcmap": "rev": "ad7cdf699c06a5c3d974fd8455e1017803a1dcc8" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": +++ readlink -f '{}' Step #3 - "compile-libfuzzer-address-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/vtpm-td/{}' ';' Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_CRATE_DIRS=/src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + git submodule update --init --recursive Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/ms-tpm-20-ref' (https://github.com/microsoft/ms-tpm-20-ref.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/openssl' (https://github.com/openssl/openssl.git) registered for path 'deps/rust-tpm-20-ref/openssl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/smallc/musl' (https://git.musl-libc.org/git/musl) registered for path 'deps/rust-tpm-20-ref/smallc/musl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/spdm-rs' (https://github.com/ccc-spdm-tools/spdm-rs.git) registered for path 'deps/spdm-rs' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/smallc/musl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/td-shim'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx': checked out '0939077616b16d10f82652dd1361a5d4ed8b2e56' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dcap_source'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dnnl/dnnl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/ippcp_internal/ipp-crypto'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/openmp/openmp_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/sgx-emm/emm_src'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out 'a4e3c1da8095d363ada0f5b7bec7850563e8139d' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out 'd9d13aaaf8889753fb58a13c2652c39b67c2076b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '222b9d8cd246809cc8da041241824b0d0469000f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref': checked out 'd638536d0fe01acd5e39ffa1bd100b3da82d92c7' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/wolfssl' (https://github.com/wolfSSL/wolfssl.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl': checked out '9c87f979a7f1d3a6d786b260653d566c1d31a1c4' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl': checked out '2cf4e90eaaf7402bf038b158dbdacd0a15561fb7' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'gost-engine' (https://github.com/gost-engine/engine) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'krb5' (https://github.com/krb5/krb5) registered for path 'deps/rust-tpm-20-ref/openssl/krb5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'oqs-provider' (https://github.com/open-quantum-safe/oqs-provider.git) registered for path 'deps/rust-tpm-20-ref/openssl/oqs-provider' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'pyca.cryptography' (https://github.com/pyca/cryptography.git) registered for path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'python-ecdsa' (https://github.com/tlsfuzzer/python-ecdsa) registered for path 'deps/rust-tpm-20-ref/openssl/python-ecdsa' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'tlsfuzzer' (https://github.com/tlsfuzzer/tlsfuzzer) registered for path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'tlslite-ng' (https://github.com/tlsfuzzer/tlslite-ng) registered for path 'deps/rust-tpm-20-ref/openssl/tlslite-ng' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'wycheproof' (https://github.com/google/wycheproof) registered for path 'deps/rust-tpm-20-ref/openssl/wycheproof' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/krb5'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/oqs-provider'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/pyca-cryptography'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/python-ecdsa'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlsfuzzer'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlslite-ng'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/wycheproof'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine': checked out 'b2b4d629f100eaee9f5942a106b1ccefe85b8808' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'libprov' (https://github.com/provider-corner/libprov.git) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine/libprov'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov': checked out '8a126e09547630ef900177625626b6156052f0ee' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/krb5': checked out 'aa9b4a2a64046afd2fab7cb49c346295874a5fb6' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/oqs-provider': checked out '3f3d8a8cf331c73a26fe93a598273997cb54eb4f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography': checked out 'c18d0567386414efa3caef7ed586c4ca75bf3a8b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/python-ecdsa': checked out '4de8d5bf89089d1140eb99aa5d7eb2dc8e6337b6' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer': checked out 'dbd56c149072e656ca8d6a43a59588f3e7513da2' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlslite-ng': checked out '771e9f59d639dbb0e2fa8e646c8e588405d3903e' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/wycheproof': checked out '2196000605e45d91097147c9c71f26b72af58003' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/smallc/musl': checked out 'f5f55d6589940fd2c2188d76686efe3a530e64e0' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs': checked out 'f42eaf4680da0b0684ec1b9d64b7e417f8ff8160' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/spdm-rs/external/ring' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/webpki' (https://github.com/briansmith/webpki.git) registered for path 'deps/spdm-rs/external/webpki' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/webpki'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs/external/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs/external/webpki': checked out 'f84a538a5cd281ba1ffc0d54bbe5824cf5969703' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim': checked out '5f46c59f341f6b8df976ce6409ab81a0da39bcf1' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/td-shim/library/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": + bash sh_script/pre-build.sh Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim/library/ring /src/vtpm-td/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": patching file Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file build.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs/external/ring /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs/external/webpki /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at f84a538 0.22.4. Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref /src/vtpm-td/deps/rust-tpm-20-ref Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at d638536 Merge pull request #64 from jhand2/compiler_warnings Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/src/support/Manufacture.c Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/configure.ac Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/include/Ossl/TpmToOsslMath.h Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/include/BaseTypes.h Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/vtpm-td/./src/crypto =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/vtpm-td/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 95 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.8.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.96) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.14.0+wasi-0.2.3) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded async-trait v0.1.85 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bytes v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize_derive v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded maybe-async v0.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-sink v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_json v1.0.137 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-channel v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.137 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-sink v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling codec v0.2.2 (/src/vtpm-td/deps/spdm-rs/codec) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bytes v1.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-channel v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.10 Step #3 - "compile-libfuzzer-address-x86_64": error[E0053]: method `steps_between` has an incompatible type for trait Step #3 - "compile-libfuzzer-address-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/x86_64-0.14.13/src/addr.rs:387:51 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 387 |  fn steps_between(start: &Self, end: &Self) -> (usize, Option) { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ expected `Option`, found `(usize, Option)` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected signature `fn(&addr::VirtAddr, &addr::VirtAddr) -> Option` Step #3 - "compile-libfuzzer-address-x86_64":  found signature `fn(&addr::VirtAddr, &addr::VirtAddr) -> (usize, Option)` Step #3 - "compile-libfuzzer-address-x86_64": help: change the output type to match the trait Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 387 |  fn steps_between(start: &Self, end: &Self) -> Option { Step #3 - "compile-libfuzzer-address-x86_64":  | ~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0053]: method `steps_between` has an incompatible type for trait Step #3 - "compile-libfuzzer-address-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/x86_64-0.14.13/src/structures/paging/page.rs:284:51 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 284 |  fn steps_between(start: &Self, end: &Self) -> (usize, Option) { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ expected `Option`, found `(usize, Option)` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected signature `fn(&Page<_>, &Page<_>) -> Option` Step #3 - "compile-libfuzzer-address-x86_64":  found signature `fn(&Page<_>, &Page<_>) -> (usize, Option)` Step #3 - "compile-libfuzzer-address-x86_64": help: change the output type to match the trait Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 284 |  fn steps_between(start: &Self, end: &Self) -> Option { Step #3 - "compile-libfuzzer-address-x86_64":  | ~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64": For more information about this error, try `rustc --explain E0053`. Step #3 - "compile-libfuzzer-address-x86_64": error: could not compile `x86_64` (lib) due to 2 previous errors Step #3 - "compile-libfuzzer-address-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-address-x86_64": Error: failed to build fuzz script: ASAN_OPTIONS="detect_odr_violation=0" RUSTFLAGS="-Cpasses=sancov-module -Cllvm-args=-sanitizer-coverage-level=4 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters -Cllvm-args=-sanitizer-coverage-pc-table -Cllvm-args=-sanitizer-coverage-trace-compares --cfg fuzzing -Clink-dead-code -Zsanitizer=address -Cllvm-args=-sanitizer-coverage-stack-depth -C codegen-units=1 --cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers" "cargo" "build" "--manifest-path" "/src/vtpm-td/src/crypto/fuzz/Cargo.toml" "--target" "x86_64-unknown-linux-gnu" "--release" "--config" "profile.release.debug=true" "--bins" Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1