starting build "5ad71de2-a142-4e71-913e-c78ef6c8feb8" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 5fc1849ea29a: Pulling fs layer Step #1: 5bca3ba2fc7d: Pulling fs layer Step #1: c3f8f264f82b: Pulling fs layer Step #1: 4beb7a10c8f4: Pulling fs layer Step #1: 0ca13ee436c2: Pulling fs layer Step #1: d11b53fc85fe: Pulling fs layer Step #1: 1cbdd3829a23: Pulling fs layer Step #1: 7f7781280c06: Pulling fs layer Step #1: 846994f6541d: Pulling fs layer Step #1: 83087fdbd323: Pulling fs layer Step #1: 5e20af423505: Pulling fs layer Step #1: 7e2d2d2efe99: Pulling fs layer Step #1: bae98e0cfe62: Pulling fs layer Step #1: 7c94181fc29a: Pulling fs layer Step #1: 4018e9ce42a6: Pulling fs layer Step #1: bf9219ec845b: Pulling fs layer Step #1: 71174894d930: Pulling fs layer Step #1: e04ddd5d972b: Pulling fs layer Step #1: bfb7b1a6728d: Pulling fs layer Step #1: 2e1d8e23a9a8: Pulling fs layer Step #1: 153eacb0a891: Pulling fs layer Step #1: 4d7aa988bb31: Pulling fs layer Step #1: f93820478c87: Pulling fs layer Step #1: 038020a237ce: Pulling fs layer Step #1: 416ea49f7c22: Pulling fs layer Step #1: 9cdc40c52e67: Pulling fs layer Step #1: bee113eb3842: Pulling fs layer Step #1: 93286fa4d809: Pulling fs layer Step #1: 88a7cbc5ce33: Pulling fs layer Step #1: 5bdd6bc53e7b: Pulling fs layer Step #1: d84cd2be715d: Pulling fs layer Step #1: d171e73dd44a: Pulling fs layer Step #1: 9972794eff61: Pulling fs layer Step #1: 846994f6541d: Waiting Step #1: 78cb03ed3b31: Pulling fs layer Step #1: c3f8f264f82b: Waiting Step #1: 83087fdbd323: Waiting Step #1: 4beb7a10c8f4: Waiting Step #1: 7c94181fc29a: Waiting Step #1: 5e20af423505: Waiting Step #1: 4018e9ce42a6: Waiting Step #1: 7e2d2d2efe99: Waiting Step #1: bf9219ec845b: Waiting Step #1: 0ca13ee436c2: Waiting Step #1: bae98e0cfe62: Waiting Step #1: d11b53fc85fe: Waiting Step #1: 71174894d930: Waiting Step #1: 7f7781280c06: Waiting Step #1: e04ddd5d972b: Waiting Step #1: 93286fa4d809: Waiting Step #1: f93820478c87: Waiting Step #1: bfb7b1a6728d: Waiting Step #1: 88a7cbc5ce33: Waiting Step #1: 5bdd6bc53e7b: Waiting Step #1: 2e1d8e23a9a8: Waiting Step #1: d84cd2be715d: Waiting Step #1: 9cdc40c52e67: Waiting Step #1: d171e73dd44a: Waiting Step #1: 416ea49f7c22: Waiting Step #1: 153eacb0a891: Waiting Step #1: bee113eb3842: Waiting Step #1: 9972794eff61: Waiting Step #1: 78cb03ed3b31: Waiting Step #1: 4d7aa988bb31: Waiting Step #1: 5bca3ba2fc7d: Verifying Checksum Step #1: 5bca3ba2fc7d: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: c3f8f264f82b: Verifying Checksum Step #1: c3f8f264f82b: Download complete Step #1: 4beb7a10c8f4: Download complete Step #1: 0ca13ee436c2: Verifying Checksum Step #1: 0ca13ee436c2: Download complete Step #1: 5fc1849ea29a: Verifying Checksum Step #1: 5fc1849ea29a: Download complete Step #1: 1cbdd3829a23: Verifying Checksum Step #1: 1cbdd3829a23: Download complete Step #1: 7f7781280c06: Verifying Checksum Step #1: 7f7781280c06: Download complete Step #1: b549f31133a9: Pull complete Step #1: 83087fdbd323: Verifying Checksum Step #1: 83087fdbd323: Download complete Step #1: 5e20af423505: Verifying Checksum Step #1: 5e20af423505: Download complete Step #1: 7e2d2d2efe99: Download complete Step #1: bae98e0cfe62: Verifying Checksum Step #1: bae98e0cfe62: Download complete Step #1: 846994f6541d: Verifying Checksum Step #1: 846994f6541d: Download complete Step #1: 7c94181fc29a: Verifying Checksum Step #1: 7c94181fc29a: Download complete Step #1: bf9219ec845b: Verifying Checksum Step #1: bf9219ec845b: Download complete Step #1: e04ddd5d972b: Download complete Step #1: 71174894d930: Verifying Checksum Step #1: 71174894d930: Download complete Step #1: 2e1d8e23a9a8: Verifying Checksum Step #1: 2e1d8e23a9a8: Download complete Step #1: bfb7b1a6728d: Verifying Checksum Step #1: bfb7b1a6728d: Download complete Step #1: 153eacb0a891: Download complete Step #1: 4d7aa988bb31: Verifying Checksum Step #1: 4d7aa988bb31: Download complete Step #1: f93820478c87: Verifying Checksum Step #1: f93820478c87: Download complete Step #1: 038020a237ce: Verifying Checksum Step #1: 038020a237ce: Download complete Step #1: 416ea49f7c22: Download complete Step #1: 9cdc40c52e67: Download complete Step #1: d11b53fc85fe: Verifying Checksum Step #1: d11b53fc85fe: Download complete Step #1: bee113eb3842: Verifying Checksum Step #1: bee113eb3842: Download complete Step #1: 93286fa4d809: Verifying Checksum Step #1: 93286fa4d809: Download complete Step #1: 5fc1849ea29a: Pull complete Step #1: 5bdd6bc53e7b: Verifying Checksum Step #1: 5bdd6bc53e7b: Download complete Step #1: 88a7cbc5ce33: Verifying Checksum Step #1: 88a7cbc5ce33: Download complete Step #1: 5bca3ba2fc7d: Pull complete Step #1: d84cd2be715d: Download complete Step #1: d171e73dd44a: Verifying Checksum Step #1: d171e73dd44a: Download complete Step #1: 9972794eff61: Verifying Checksum Step #1: 9972794eff61: Download complete Step #1: c3f8f264f82b: Pull complete Step #1: 4beb7a10c8f4: Pull complete Step #1: 0ca13ee436c2: Pull complete Step #1: 78cb03ed3b31: Verifying Checksum Step #1: 78cb03ed3b31: Download complete Step #1: d11b53fc85fe: Pull complete Step #1: 1cbdd3829a23: Pull complete Step #1: 7f7781280c06: Pull complete Step #1: 846994f6541d: Pull complete Step #1: 83087fdbd323: Pull complete Step #1: 5e20af423505: Pull complete Step #1: 7e2d2d2efe99: Pull complete Step #1: bae98e0cfe62: Pull complete Step #1: 7c94181fc29a: Pull complete Step #1: 4018e9ce42a6: Pull complete Step #1: bf9219ec845b: Pull complete Step #1: 71174894d930: Pull complete Step #1: e04ddd5d972b: Pull complete Step #1: bfb7b1a6728d: Pull complete Step #1: 2e1d8e23a9a8: Pull complete Step #1: 153eacb0a891: Pull complete Step #1: 4d7aa988bb31: Pull complete Step #1: f93820478c87: Pull complete Step #1: 038020a237ce: Pull complete Step #1: 416ea49f7c22: Pull complete Step #1: 9cdc40c52e67: Pull complete Step #1: bee113eb3842: Pull complete Step #1: 93286fa4d809: Pull complete Step #1: 88a7cbc5ce33: Pull complete Step #1: 5bdd6bc53e7b: Pull complete Step #1: d84cd2be715d: Pull complete Step #1: d171e73dd44a: Pull complete Step #1: 9972794eff61: Pull complete Step #1: 78cb03ed3b31: Pull complete Step #1: Digest: sha256:32d484571e408fabf27a1363cb36d7980f70e62e05f4be6437ba8aa7f87faeff Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> e72e2378f951 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y nasm llvm clang Step #1: ---> Running in af9a9b5f3ad3 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (633 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: binfmt-support clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: Suggested packages: Step #1: clang-10-doc ncurses-doc libomp-10-doc llvm-10-doc python3-doc python3-tk Step #1: python3-venv python3-setuptools python-pygments-doc ttf-bitstream-vera Step #1: python3.8-venv python3.8-doc Step #1: The following NEW packages will be installed: Step #1: binfmt-support clang clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support nasm python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: 0 upgraded, 42 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 84.4 MB of archives. Step #1: After this operation, 505 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.13 [720 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.13 [1900 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.13 [1675 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.13 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 libyaml-0-2 amd64 0.2.2-1 [48.9 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.2 [130 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-yaml amd64 5.3.1-1ubuntu0.1 [136 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/universe amd64 binfmt-support amd64 2.2.0-2 [58.2 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libllvm10 amd64 1:10.0.0-4ubuntu1 [15.3 MB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-cpp10 amd64 1:10.0.0-4ubuntu1 [9944 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/main amd64 libgc1c2 amd64 1:7.6.4-0.4ubuntu1 [83.9 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc4 amd64 10.5.0-1ubuntu1~20.04 [42.8 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [225 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-common-10-dev amd64 1:10.0.0-4ubuntu1 [5012 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang1-10 amd64 1:10.0.0-4ubuntu1 [7571 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang-10 amd64 1:10.0.0-4ubuntu1 [66.9 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang amd64 1:10.0-50~exp1 [3276 B] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libncurses-dev amd64 6.2-0ubuntu2.1 [340 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp5-10 amd64 1:10.0.0-4ubuntu1 [300 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp-10-dev amd64 1:10.0.0-4ubuntu1 [47.7 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libtinfo-dev amd64 6.2-0ubuntu2.1 [972 B] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-runtime amd64 1:10.0.0-4ubuntu1 [180 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-runtime amd64 1:10.0-50~exp1 [2916 B] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 libpfm4 amd64 4.10.1+git20-g7700f49-2 [266 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10 amd64 1:10.0.0-4ubuntu1 [5214 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm amd64 1:10.0-50~exp1 [3880 B] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pygments all 2.3.1+dfsg-1ubuntu2.2 [579 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-tools amd64 1:10.0.0-4ubuntu1 [317 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-4 amd64 4.8.7-4build1 [6792 kB] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-dev amd64 4.8.7-4build1 [67.5 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-dev amd64 1:10.0.0-4ubuntu1 [26.0 MB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 84.4 MB in 1s (60.6 MB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17676 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18078 files and directories currently installed.) Step #1: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libyaml-0-2:amd64. Step #1: Preparing to unpack .../04-libyaml-0-2_0.2.2-1_amd64.deb ... Step #1: Unpacking libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Selecting previously unselected package python3-pkg-resources. Step #1: Preparing to unpack .../05-python3-pkg-resources_45.2.0-1ubuntu0.2_all.deb ... Step #1: Unpacking python3-pkg-resources (45.2.0-1ubuntu0.2) ... Step #1: Selecting previously unselected package python3-yaml. Step #1: Preparing to unpack .../06-python3-yaml_5.3.1-1ubuntu0.1_amd64.deb ... Step #1: Unpacking python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Selecting previously unselected package libpipeline1:amd64. Step #1: Preparing to unpack .../07-libpipeline1_1.5.2-2build1_amd64.deb ... Step #1: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Selecting previously unselected package binfmt-support. Step #1: Preparing to unpack .../08-binfmt-support_2.2.0-2_amd64.deb ... Step #1: Unpacking binfmt-support (2.2.0-2) ... Step #1: Selecting previously unselected package libllvm10:amd64. Step #1: Preparing to unpack .../09-libllvm10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-cpp10. Step #1: Preparing to unpack .../10-libclang-cpp10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libgc1c2:amd64. Step #1: Preparing to unpack .../11-libgc1c2_1%3a7.6.4-0.4ubuntu1_amd64.deb ... Step #1: Unpacking libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Selecting previously unselected package libobjc4:amd64. Step #1: Preparing to unpack .../12-libobjc4_10.5.0-1ubuntu1~20.04_amd64.deb ... Step #1: Unpacking libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libobjc-9-dev:amd64. Step #1: Preparing to unpack .../13-libobjc-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libclang-common-10-dev. Step #1: Preparing to unpack .../14-libclang-common-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang1-10. Step #1: Preparing to unpack .../15-libclang1-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang-10. Step #1: Preparing to unpack .../16-clang-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang. Step #1: Preparing to unpack .../17-clang_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking clang (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libncurses-dev:amd64. Step #1: Preparing to unpack .../18-libncurses-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package libomp5-10:amd64. Step #1: Preparing to unpack .../19-libomp5-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libomp-10-dev. Step #1: Preparing to unpack .../20-libomp-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libtinfo-dev:amd64. Step #1: Preparing to unpack .../21-libtinfo-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package llvm-10-runtime. Step #1: Preparing to unpack .../22-llvm-10-runtime_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm-runtime. Step #1: Preparing to unpack .../23-llvm-runtime_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm-runtime (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libpfm4:amd64. Step #1: Preparing to unpack .../24-libpfm4_4.10.1+git20-g7700f49-2_amd64.deb ... Step #1: Unpacking libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Selecting previously unselected package llvm-10. Step #1: Preparing to unpack .../25-llvm-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm. Step #1: Preparing to unpack .../26-llvm_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libffi-dev:amd64. Step #1: Preparing to unpack .../27-libffi-dev_3.3-4_amd64.deb ... Step #1: Unpacking libffi-dev:amd64 (3.3-4) ... Step #1: Selecting previously unselected package python3-pygments. Step #1: Preparing to unpack .../28-python3-pygments_2.3.1+dfsg-1ubuntu2.2_all.deb ... Step #1: Unpacking python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Selecting previously unselected package llvm-10-tools. Step #1: Preparing to unpack .../29-llvm-10-tools_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libz3-4:amd64. Step #1: Preparing to unpack .../30-libz3-4_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-4:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package libz3-dev:amd64. Step #1: Preparing to unpack .../31-libz3-dev_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package llvm-10-dev. Step #1: Preparing to unpack .../32-llvm-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package nasm. Step #1: Preparing to unpack .../33-nasm_2.14.02-1_amd64.deb ... Step #1: Unpacking nasm (2.14.02-1) ... Step #1: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Setting up libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Setting up libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libffi-dev:amd64 (3.3-4) ... Step #1: Setting up libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libz3-4:amd64 (4.8.7-4build1) ... Step #1: Setting up libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Setting up libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up binfmt-support (2.2.0-2) ... Step #1: invoke-rc.d: could not determine current runlevel Step #1: invoke-rc.d: policy-rc.d denied execution of start. Step #1: Setting up nasm (2.14.02-1) ... Step #1: Setting up libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Setting up libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Setting up llvm-runtime (1:10.0-50~exp1) ... Step #1: Setting up clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pkg-resources (45.2.0-1ubuntu0.2) ... Step #1: Setting up llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Setting up clang (1:10.0-50~exp1) ... Step #1: Setting up llvm (1:10.0-50~exp1) ... Step #1: Setting up llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container af9a9b5f3ad3 Step #1: ---> 3f3db8d29b1d Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/intel/MigTD.git Step #1: ---> Running in 499752c87b42 Step #1: Cloning into 'MigTD'... Step #1: Removing intermediate container 499752c87b42 Step #1: ---> aad2fba7ad1f Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> 68f13a989f51 Step #1: Step 5/5 : WORKDIR $SRC/MigTD Step #1: ---> Running in e4851fc0ce3d Step #1: Removing intermediate container e4851fc0ce3d Step #1: ---> 9b8676cf34a1 Step #1: Successfully built 9b8676cf34a1 Step #1: Successfully tagged gcr.io/oss-fuzz/migtd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/migtd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filefXVSaM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/MigTD/.git Step #2 - "srcmap": + GIT_DIR=/src/MigTD Step #2 - "srcmap": + cd /src/MigTD Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/intel/MigTD.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=6a19c8d50102e232c7653e3b96472cc1a7fa6e80 Step #2 - "srcmap": + jq_inplace /tmp/filefXVSaM '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "6a19c8d50102e232c7653e3b96472cc1a7fa6e80" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileIBciwd Step #2 - "srcmap": + cat /tmp/filefXVSaM Step #2 - "srcmap": + jq '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "6a19c8d50102e232c7653e3b96472cc1a7fa6e80" }' Step #2 - "srcmap": + mv /tmp/fileIBciwd /tmp/filefXVSaM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filefXVSaM Step #2 - "srcmap": + rm /tmp/filefXVSaM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/MigTD": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/intel/MigTD.git", Step #2 - "srcmap": "rev": "6a19c8d50102e232c7653e3b96472cc1a7fa6e80" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": +++ readlink -f '{}' Step #3 - "compile-libfuzzer-address-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/MigTD/{}' ';' Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_CRATE_DIRS='/src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/migtd' Step #3 - "compile-libfuzzer-address-x86_64": + git submodule update --init --recursive Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim'... Step #3 - "compile-libfuzzer-address-x86_64": remote: Enumerating objects: 3, done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Counting objects: 50% (1/2) remote: Counting objects: 100% (2/2) remote: Counting objects: 100% (2/2), done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Compressing objects: 50% (1/2) remote: Compressing objects: 100% (2/2) remote: Compressing objects: 100% (2/2), done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Total 3 (delta 0), reused 0 (delta 0), pack-reused 1 (from 1) Step #3 - "compile-libfuzzer-address-x86_64": Unpacking objects: 33% (1/3) Unpacking objects: 66% (2/3) Unpacking objects: 100% (3/3) Unpacking objects: 100% (3/3), 1.97 KiB | 1.97 MiB/s, done. Step #3 - "compile-libfuzzer-address-x86_64": From https://github.com/intel/linux-sgx Step #3 - "compile-libfuzzer-address-x86_64": * branch e87b7ab876179442691ae5e58e68c81d4834c667 -> FETCH_HEAD Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx': checked out 'e87b7ab876179442691ae5e58e68c81d4834c667' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/cbor/libcbor' (https://github.com/PJK/libcbor.git) registered for path 'deps/linux-sgx/external/cbor/libcbor' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/mbedtls/mbedtls_code' (https://github.com/Mbed-TLS/mbedtls.git) registered for path 'deps/linux-sgx/external/mbedtls/mbedtls_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dnnl/dnnl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/ippcp_internal/ipp-crypto'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/mbedtls/mbedtls_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/openmp/openmp_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/sgx-emm/emm_src'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor': checked out 'efa6c0886bae46bdaef9b679f61f4b9d8bc296ae' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'doxygen-theme' (https://github.com/nnen/doxygen-theme.git) registered for path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor/doxygen-theme'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme': checked out '46111c61a9f49b7a9886127e679d4317478fab1c' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out '8f943ebcfbc3e4345998cf9a43470edeb5e501cb' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QVL' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationLibrary.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QuoteVerificationService' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationService.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/jwt-cpp' (https://github.com/Thalhammer/jwt-cpp.git) registered for path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/wasm-micro-runtime' (https://github.com/bytecodealliance/wasm-micro-runtime.git) registered for path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QVL'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/jwt-cpp'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL': checked out '16b7291a7a86e486fdfcf1dfb4be885c0cc00b4e' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService': checked out 'abebcaf098d40fe0aa405384ad841862da0cbc4b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp': checked out '4a537e969891dde542ad8b1a4a214955a83be29f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime': checked out '75936680662ddc31af6763daa55a622422f9e2f5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out '48d0e528cf948f32a0ed6e734e6e211470e5971a' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/mbedtls/mbedtls_code': checked out '1ec69067fa1351427f904362c1221b31538c8b57' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '893dcbc4e1452f9c20fbe31785a9054acc0cc867' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim': checked out '1a9393291bc54635f337a9a868374e29b2913842' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim/library/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": + bash sh_script/preparation.sh Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim/library/ring /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": *** Please tell me who you are. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Run Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": git config --global user.email "you@example.com" Step #3 - "compile-libfuzzer-address-x86_64": git config --global user.name "Your Name" Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": to set your account's default identity. Step #3 - "compile-libfuzzer-address-x86_64": Omit --global to set the identity only in this repository. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": fatal: unable to auto-detect email address (got 'root@446ca51e59d4.(none)') Step #3 - "compile-libfuzzer-address-x86_64": patching file Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file build.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/crypto =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 73 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.14.0+wasi-0.2.3) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded allocator-api2 v0.2.21 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time v0.3.37 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-pki-types v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls v0.23.21 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 3 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-fuzz v0.0.0 (/src/MigTD/src/crypto/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/x509.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "afl_x509") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "x509") generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 41.28s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_x509 Step #3 - "compile-libfuzzer-address-x86_64": x509' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=x509 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=crypto Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/x509 /workspace/out/libfuzzer-address-x86_64/crypto-x509 Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/policy =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/policy' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 105 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.15 (latest: v0.7.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.96) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.14.0+wasi-0.2.3) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cpufeatures v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded anyhow v1.0.95 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded home v0.5.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_json v1.0.135 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded errno v0.3.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustix v0.38.43 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linux-raw-sys v0.4.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.43 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.95 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.135 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.2.1 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.1 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 3 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-migtd-policy-fuzz v0.0.0 (/src/MigTD/src/policy/fuzz) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 42.53s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_policy Step #3 - "compile-libfuzzer-address-x86_64": policy' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/policy /workspace/out/libfuzzer-address-x86_64/policy-policy Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/vsock =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/vsock' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64": warning: /src/MigTD/src/devices/vsock/Cargo.toml: unused manifest key: dependencies.td-payload.feature Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Locking 110 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bit_field v0.9.0 (latest: v0.10.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitfield v0.13.2 (latest: v0.17.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.8.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.15 (latest: v0.7.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding raw-cpuid v10.7.0 (latest: v11.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spinning_top v0.2.5 (latest: v0.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.96) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86 v0.47.0 (latest: v0.52.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.43 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.95 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.135 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.2.1 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:502:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 502 |  let command = self.read_u16(0x4)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:503:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 503 |  let status = self.read_u16(0x6)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:537:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 537 |  let mut size = self.read_u64(current_bar_offset)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:571:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 397 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 571 |  fn get_bar_size(&self, offset: u8) -> Result { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `core::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:559:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 559 | /  self.write_u16( Step #3 - "compile-libfuzzer-address-x86_64": 560 | |  0x4, Step #3 - "compile-libfuzzer-address-x86_64": 561 | |  (PciCommand::IO_SPACE | PciCommand::MEMORY_SPACE | PciCommand::BUS_MASTER).bits(), Step #3 - "compile-libfuzzer-address-x86_64": 562 | |  ); Step #3 - "compile-libfuzzer-address-x86_64":  | |_________^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 559 |  let _ = self.write_u16( Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.1 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 6 warnings (run `cargo fix --lib -p pci` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `InterruptShadowStackTable` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-payload/src/arch/x86_64/cet.rs:31:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | struct InterruptShadowStackTable { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `InterruptCallback` and `register_interrupt_callback` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:10:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | use td_payload::arch::idt::{register_interrupt_callback, InterruptCallback, InterruptStack}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `vector` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:25:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 |  vector: u8, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_vector` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `cb` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:26:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 26 |  cb: fn(&mut InterruptStack), Step #3 - "compile-libfuzzer-address-x86_64":  | ^^ help: if this is intentional, prefix it with an underscore: `_cb` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-payload` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock` (lib) generated 3 warnings (run `cargo fix --lib -p vsock` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock-fuzz v0.0.0 (/src/MigTD/src/devices/vsock/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PciDevice` and `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:8:15 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | pub use pci::{get_fuzz_seed_address, PciDevice, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, and `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:9:18 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | pub use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `Mutex` and `once::Once` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:8:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use spin::{once::Once, Mutex}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `std::thread::spawn` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:9:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | use std::thread::spawn; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `Result` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:10:46 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | use virtio::{virtio_pci::VirtioPciTransport, Result}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:116:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 116 |  let device_addr = paddr - PAGE_SIZE as u64 + 0x100 + 0x200; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:20:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:21:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_2` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:31:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | const USED_LEN_VAL_2: u16 = 2; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_4` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:32:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 32 | const USED_LEN_VAL_4: u16 = 4; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_6` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:33:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 33 | const USED_LEN_VAL_6: u16 = 6; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `FIRST_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:36:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 | const FIRST_USED_LEN_OFFSET: u64 = 16; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TWO_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:37:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 | const TWO_USED_LEN_OFFSET: u64 = 24; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `THREE_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:38:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 | const THREE_USED_LEN_OFFSET: u64 = 32; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PAGE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:13:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | pub const PAGE_SIZE: usize = 0x1000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:15:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:16:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 16 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:18:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 18 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:22:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 22 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:113:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  let _ = register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:147:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  let _ = server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:148:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  let _ = server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock-fuzz` (bin "afl_vsock") generated 30 warnings (run `cargo fix --bin "afl_vsock"` to apply 7 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 14.72s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_vsock Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_vsock =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/virtio =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/virtio' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Locking 51 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bit_field v0.9.0 (latest: v0.10.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.8.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.96) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.2.1 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:502:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 502 |  let command = self.read_u16(0x4)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:503:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 503 |  let status = self.read_u16(0x6)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:537:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 537 |  let mut size = self.read_u64(current_bar_offset)?; Step #3 - "compile-libfuzzer-address-x86_64":  | ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:571:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 397 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 571 |  fn get_bar_size(&self, offset: u8) -> Result { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `core::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:559:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 559 | /  self.write_u16( Step #3 - "compile-libfuzzer-address-x86_64": 560 | |  0x4, Step #3 - "compile-libfuzzer-address-x86_64": 561 | |  (PciCommand::IO_SPACE | PciCommand::MEMORY_SPACE | PciCommand::BUS_MASTER).bits(), Step #3 - "compile-libfuzzer-address-x86_64": 562 | |  ); Step #3 - "compile-libfuzzer-address-x86_64":  | |_________^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 559 |  let _ = self.write_u16( Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 6 warnings (run `cargo fix --lib -p pci` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio-fuzz v0.0.0 (/src/MigTD/src/devices/virtio/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::fuzzlib::dma_alloc::virtio_dma_alloc` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use crate::fuzzlib::dma_alloc::virtio_dma_alloc; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `VirtQueueLayout` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 |  virtqueue::{VirtQueue, VirtQueueLayout, VirtqueueBuf}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:6:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use fuzzlib::{fuzz_virtio, get_fuzz_seed_address, init, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `pci::PciDevice` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:7:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | use pci::PciDevice; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, and `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:8:14 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:29:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let common_addr = 0; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:10:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:14:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:15:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:17:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:21:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:23:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:24:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:25:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:27:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `QUEUE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:28:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | pub const QUEUE_SIZE: usize = 16; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:34:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let _ = transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:35:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  let _ = transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:36:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let _ = transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:37:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  let _ = transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:38:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  let _ = transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:39:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  let _ = transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:40:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  let _ = transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:41:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  let _ = transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:42:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  let _ = transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:44:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  let _ = transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `virtio-fuzz` (bin "afl_virtio") generated 30 warnings (run `cargo fix --bin "afl_virtio"` to apply 6 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 5.58s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_virtio Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_virtio =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/migtd =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/migtd' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 124 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitfield v0.13.2 (latest: v0.17.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.8.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.15 (latest: v0.7.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding raw-cpuid v10.7.0 (latest: v11.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.217) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spinning_top v0.2.5 (latest: v0.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.96) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.14.0+wasi-0.2.3) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86 v0.47.0 (latest: v0.52.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.13 (latest: v0.15.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.14) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.25 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.95 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.43 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.135 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd v0.4.7 (/src/MigTD/src/migtd) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.96 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.2.1 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-loader v0.1.0 (/src/MigTD/deps/td-shim/td-loader) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.1 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `InterruptShadowStackTable` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-payload/src/arch/x86_64/cet.rs:31:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | struct InterruptShadowStackTable { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-payload` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::ratls` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:20:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | use crate::ratls; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_DEC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:23:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | const TDCS_FIELD_MIG_DEC_KEY: u64 = 0x9810_0003_0000_0010; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_ENC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:24:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | const TDCS_FIELD_MIG_ENC_KEY: u64 = 0x9810_0003_0000_0018; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:25:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | const TDCS_FIELD_MIG_VERSION: u64 = 0x9810_0001_0000_0020; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:27:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | const GSM_FIELD_MIN_EXPORT_VERSION: u64 = 0x2000000100000001; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:28:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | const GSM_FIELD_MAX_EXPORT_VERSION: u64 = 0x2000000100000002; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:29:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 | const GSM_FIELD_MIN_IMPORT_VERSION: u64 = 0x2000000100000003; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:30:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 30 | const GSM_FIELD_MAX_IMPORT_VERSION: u64 = 0x2000000100000004; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `ExchangeInformation` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:50:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 50 | struct ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: methods `as_bytes` and `as_bytes_mut` are never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:67:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 66 | impl ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  | ------------------------ methods in this implementation Step #3 - "compile-libfuzzer-address-x86_64": 67 |  fn as_bytes(&self) -> &[u8] { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 71 |  fn as_bytes_mut(&mut self) -> &mut [u8] { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `Complete` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:79:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 76 | enum MigrationState { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 79 |  Complete(RequestInformation), Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `cal_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:494:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 494 | fn cal_mig_version( Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `set_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:526:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 526 | fn set_mig_version(info: &MigrationInformation, mig_ver: u16) -> Result<()> { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd` (lib) generated 13 warnings (run `cargo fix --lib -p migtd` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 3 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd-fuzz v0.0.0 (/src/MigTD/src/migtd/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `NoCertificatesPresented` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub enum MigrationError { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 14 |  NoCertificatesPresented, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `MigrationError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/service_response.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "service_response") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "afl_service_response") generated 3 warnings (1 duplicate) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 40.02s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_service_response Step #3 - "compile-libfuzzer-address-x86_64": service_response' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=service_response Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=migtd Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/service_response /workspace/out/libfuzzer-address-x86_64/migtd-service_response Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 5fc1849ea29a: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 5bca3ba2fc7d: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": fae44f6c4afb: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6bb086a76dac: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 93d27c16d33e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2ed907c114e3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c356b7427c88: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e8d856c3fdca: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3931eca29f39: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b76e3f62a0ba: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7bfd5336ece5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e0b08c0fdc11: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2846796a4416: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6cc7e05a106e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6c44541c6a30: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 110ea339d19c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 080996c25b34: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4c9dcebec043: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5e63b9addfd0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7606710857f8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 47b62b419d91: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": be88441f6a95: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2846796a4416: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6e1d3dc39f27: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6c44541c6a30: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8fd9caca2676: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 110ea339d19c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6cc7e05a106e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b76e3f62a0ba: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e0b08c0fdc11: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 080996c25b34: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 10ceb6aa6ab4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7bfd5336ece5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2ed907c114e3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4c9dcebec043: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e8d856c3fdca: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5e63b9addfd0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6e1d3dc39f27: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 8fd9caca2676: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 47b62b419d91: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3931eca29f39: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": be88441f6a95: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7606710857f8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 93d27c16d33e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 93d27c16d33e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fae44f6c4afb: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fae44f6c4afb: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fae44f6c4afb: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6bb086a76dac: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6bb086a76dac: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c356b7427c88: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c356b7427c88: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3931eca29f39: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2ed907c114e3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2ed907c114e3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6bb086a76dac: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b76e3f62a0ba: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b76e3f62a0ba: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 93d27c16d33e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7bfd5336ece5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2ed907c114e3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e8d856c3fdca: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e8d856c3fdca: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2846796a4416: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2846796a4416: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c356b7427c88: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6cc7e05a106e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6cc7e05a106e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c44541c6a30: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6c44541c6a30: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 080996c25b34: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 080996c25b34: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e0b08c0fdc11: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e0b08c0fdc11: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 110ea339d19c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5e63b9addfd0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5e63b9addfd0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7606710857f8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7606710857f8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 47b62b419d91: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 47b62b419d91: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e8d856c3fdca: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3931eca29f39: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": be88441f6a95: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": be88441f6a95: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b76e3f62a0ba: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7bfd5336ece5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c9dcebec043: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4c9dcebec043: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8fd9caca2676: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 10ceb6aa6ab4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 10ceb6aa6ab4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6e1d3dc39f27: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6e1d3dc39f27: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e0b08c0fdc11: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2846796a4416: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6cc7e05a106e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c44541c6a30: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 110ea339d19c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 080996c25b34: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c9dcebec043: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5e63b9addfd0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7606710857f8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 47b62b419d91: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": be88441f6a95: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6e1d3dc39f27: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 8fd9caca2676: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 10ceb6aa6ab4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:dc299f69dfed0a7c14bd3c39c65c153824e6f98156f34438d47c59f39aa939bf Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4xz6vlqy/crypto-x509 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4xz6vlqy/migtd-service_response Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4xz6vlqy/policy-policy Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/migtd Step #6: adding: crypto-x509 (deflated 73%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: migtd-service_response (deflated 74%) Step #6: adding: policy-policy (deflated 74%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 148 0 0 100 148 0 826 --:--:-- --:--:-- --:--:-- 826 100 148 0 0 100 148 0 826 --:--:-- --:--:-- --:--:-- 822 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 90 44.1M 0 0 90 39.9M 0 106M --:--:-- --:--:-- --:--:-- 106M 100 44.1M 0 0 100 44.1M 0 65.7M --:--:-- --:--:-- --:--:-- 65.7M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 49 0 0 100 49 0 226 --:--:-- --:--:-- --:--:-- 225 100 49 0 0 100 49 0 226 --:--:-- --:--:-- --:--:-- 225 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 30 0 0 100 30 0 161 --:--:-- --:--:-- --:--:-- 162 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/migtd Finished Step #11 PUSH DONE