starting build "659802bf-09c2-4aaf-a010-b6b9e8d5bda8" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 6a031355e5a4: Pulling fs layer Step #1: 0b72f79bb618: Pulling fs layer Step #1: 90335b886515: Pulling fs layer Step #1: 4acfddd8e55d: Pulling fs layer Step #1: e7da934767ce: Pulling fs layer Step #1: ca48cdf3983f: Pulling fs layer Step #1: 7dbcdbf5d55f: Pulling fs layer Step #1: 50e9c68d34ea: Pulling fs layer Step #1: 4e836e3eed39: Pulling fs layer Step #1: 4b5040227f1e: Pulling fs layer Step #1: 4acfddd8e55d: Waiting Step #1: d3fb02ed4540: Pulling fs layer Step #1: 90335b886515: Waiting Step #1: 1f5f6d4a864c: Pulling fs layer Step #1: fac93c045c91: Pulling fs layer Step #1: e7da934767ce: Waiting Step #1: 8846363f4f98: Pulling fs layer Step #1: 625645c62835: Pulling fs layer Step #1: ef05bcbd095c: Pulling fs layer Step #1: c3f48f44c27e: Pulling fs layer Step #1: ca48cdf3983f: Waiting Step #1: 534e4ce04141: Pulling fs layer Step #1: bcc4f22e74eb: Pulling fs layer Step #1: 50e9c68d34ea: Waiting Step #1: b92dd1a5cf6c: Pulling fs layer Step #1: b4e67ac51e1a: Pulling fs layer Step #1: 4e836e3eed39: Waiting Step #1: 1dd8dea6f287: Pulling fs layer Step #1: 8846363f4f98: Waiting Step #1: 9db7b76f6a4a: Pulling fs layer Step #1: 4b5040227f1e: Waiting Step #1: 625645c62835: Waiting Step #1: ef05bcbd095c: Waiting Step #1: d3fb02ed4540: Waiting Step #1: 4e2c795fe7b7: Pulling fs layer Step #1: c3f48f44c27e: Waiting Step #1: 8a57f4724c32: Pulling fs layer Step #1: 534e4ce04141: Waiting Step #1: bcc4f22e74eb: Waiting Step #1: fac93c045c91: Waiting Step #1: b92dd1a5cf6c: Waiting Step #1: 1dd8dea6f287: Waiting Step #1: 73ce5d51499a: Pulling fs layer Step #1: 9db7b76f6a4a: Waiting Step #1: 66494ca4c4bd: Pulling fs layer Step #1: b4e67ac51e1a: Waiting Step #1: 86951b715a9f: Pulling fs layer Step #1: 4e2c795fe7b7: Waiting Step #1: 1f5f6d4a864c: Waiting Step #1: 5dda498c2b68: Pulling fs layer Step #1: 8a57f4724c32: Waiting Step #1: e1e35423a725: Pulling fs layer Step #1: 7dbcdbf5d55f: Waiting Step #1: 5dda498c2b68: Waiting Step #1: 73ce5d51499a: Waiting Step #1: 66494ca4c4bd: Waiting Step #1: e1e35423a725: Waiting Step #1: 0b72f79bb618: Verifying Checksum Step #1: 0b72f79bb618: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 90335b886515: Verifying Checksum Step #1: 90335b886515: Download complete Step #1: 4acfddd8e55d: Verifying Checksum Step #1: 4acfddd8e55d: Download complete Step #1: e7da934767ce: Verifying Checksum Step #1: e7da934767ce: Download complete Step #1: 7dbcdbf5d55f: Verifying Checksum Step #1: 7dbcdbf5d55f: Download complete Step #1: 50e9c68d34ea: Verifying Checksum Step #1: 50e9c68d34ea: Download complete Step #1: 6a031355e5a4: Verifying Checksum Step #1: 6a031355e5a4: Download complete Step #1: 4b5040227f1e: Verifying Checksum Step #1: 4b5040227f1e: Download complete Step #1: d3fb02ed4540: Verifying Checksum Step #1: d3fb02ed4540: Download complete Step #1: 1f5f6d4a864c: Verifying Checksum Step #1: 1f5f6d4a864c: Download complete Step #1: fac93c045c91: Verifying Checksum Step #1: fac93c045c91: Download complete Step #1: 8846363f4f98: Verifying Checksum Step #1: 8846363f4f98: Download complete Step #1: b549f31133a9: Pull complete Step #1: 625645c62835: Verifying Checksum Step #1: 625645c62835: Download complete Step #1: ef05bcbd095c: Verifying Checksum Step #1: ef05bcbd095c: Download complete Step #1: c3f48f44c27e: Verifying Checksum Step #1: c3f48f44c27e: Download complete Step #1: 534e4ce04141: Verifying Checksum Step #1: 534e4ce04141: Download complete Step #1: bcc4f22e74eb: Verifying Checksum Step #1: bcc4f22e74eb: Download complete Step #1: 4e836e3eed39: Verifying Checksum Step #1: 4e836e3eed39: Download complete Step #1: b92dd1a5cf6c: Verifying Checksum Step #1: b92dd1a5cf6c: Download complete Step #1: 1dd8dea6f287: Download complete Step #1: b4e67ac51e1a: Verifying Checksum Step #1: b4e67ac51e1a: Download complete Step #1: 9db7b76f6a4a: Verifying Checksum Step #1: 9db7b76f6a4a: Download complete Step #1: 4e2c795fe7b7: Verifying Checksum Step #1: 4e2c795fe7b7: Download complete Step #1: 8a57f4724c32: Verifying Checksum Step #1: 8a57f4724c32: Download complete Step #1: 73ce5d51499a: Download complete Step #1: 66494ca4c4bd: Download complete Step #1: 86951b715a9f: Verifying Checksum Step #1: 86951b715a9f: Download complete Step #1: 5dda498c2b68: Verifying Checksum Step #1: 5dda498c2b68: Download complete Step #1: ca48cdf3983f: Verifying Checksum Step #1: ca48cdf3983f: Download complete Step #1: 6a031355e5a4: Pull complete Step #1: 0b72f79bb618: Pull complete Step #1: e1e35423a725: Verifying Checksum Step #1: e1e35423a725: Download complete Step #1: 90335b886515: Pull complete Step #1: 4acfddd8e55d: Pull complete Step #1: e7da934767ce: Pull complete Step #1: ca48cdf3983f: Pull complete Step #1: 7dbcdbf5d55f: Pull complete Step #1: 50e9c68d34ea: Pull complete Step #1: 4e836e3eed39: Pull complete Step #1: 4b5040227f1e: Pull complete Step #1: d3fb02ed4540: Pull complete Step #1: 1f5f6d4a864c: Pull complete Step #1: fac93c045c91: Pull complete Step #1: 8846363f4f98: Pull complete Step #1: 625645c62835: Pull complete Step #1: ef05bcbd095c: Pull complete Step #1: c3f48f44c27e: Pull complete Step #1: 534e4ce04141: Pull complete Step #1: bcc4f22e74eb: Pull complete Step #1: b92dd1a5cf6c: Pull complete Step #1: b4e67ac51e1a: Pull complete Step #1: 1dd8dea6f287: Pull complete Step #1: 9db7b76f6a4a: Pull complete Step #1: 4e2c795fe7b7: Pull complete Step #1: 8a57f4724c32: Pull complete Step #1: 73ce5d51499a: Pull complete Step #1: 66494ca4c4bd: Pull complete Step #1: 86951b715a9f: Pull complete Step #1: 5dda498c2b68: Pull complete Step #1: e1e35423a725: Pull complete Step #1: Digest: sha256:0549d209e16d237aad95dbe024e0f707051ada41ad444446ad4b17c82e562c37 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 075f6c58432c Step #1: Step 2/4 : RUN git clone --depth=1 --recursive https://chromium.googlesource.com/crosvm/crosvm $SRC/crosvm Step #1: ---> Running in 0ffb68caeb27 Step #1: Cloning into '/src/crosvm'... Step #1: Submodule 'third_party/depot_tools' (https://chromium.googlesource.com/chromium/tools/depot_tools.git) registered for path 'third_party/depot_tools' Step #1: Submodule 'third_party/minigbm' (https://chromium.googlesource.com/chromiumos/platform/minigbm) registered for path 'third_party/minigbm' Step #1: Submodule 'third_party/minijail' (https://chromium.googlesource.com/chromiumos/platform/minijail) registered for path 'third_party/minijail' Step #1: Submodule 'third_party/perfetto' (https://chromium.googlesource.com/crosvm/perfetto/) registered for path 'third_party/perfetto' Step #1: Submodule 'third_party/virglrenderer' (https://chromium.googlesource.com/chromiumos/third_party/virglrenderer) registered for path 'third_party/virglrenderer' Step #1: Cloning into '/src/crosvm/third_party/depot_tools'... Step #1: Cloning into '/src/crosvm/third_party/minigbm'... Step #1: Cloning into '/src/crosvm/third_party/minijail'... Step #1: Cloning into '/src/crosvm/third_party/perfetto'... Step #1: Cloning into '/src/crosvm/third_party/virglrenderer'... Step #1: Submodule path 'third_party/depot_tools': checked out '268d645853ee8e1b884260049e5464a5ca2d8a30' Step #1: Submodule path 'third_party/minigbm': checked out '90b2d4773273b3ea180aff8f995d58e7b7604eb5' Step #1: Submodule path 'third_party/minijail': checked out '13be56d79718425a60173f61f8174669d9cc8930' Step #1: Submodule path 'third_party/perfetto': checked out '510b13481dbcd4e7e7b78428b8bcaacb6a8490c4' Step #1: Submodule path 'third_party/virglrenderer': checked out '9c9d55ecbe502e0d71ee99529709efcca69aac42' Step #1: Removing intermediate container 0ffb68caeb27 Step #1: ---> c2dad4f87c11 Step #1: Step 3/4 : RUN apt-get upgrade && apt-get install --yes --no-install-recommends libclang-dev pkg-config libcap-dev Step #1: ---> Running in 2a2754bdd9fe Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: Calculating upgrade... Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: libcap2 libclang-10-dev libclang-common-10-dev libclang1-10 libgc1c2 Step #1: libglib2.0-0 libllvm10 libobjc-9-dev libobjc4 Step #1: Recommended packages: Step #1: libglib2.0-data shared-mime-info xdg-user-dirs Step #1: The following NEW packages will be installed: Step #1: libcap-dev libcap2 libclang-10-dev libclang-common-10-dev libclang-dev Step #1: libclang1-10 libgc1c2 libglib2.0-0 libllvm10 libobjc-9-dev libobjc4 Step #1: pkg-config Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 49.0 MB of archives. Step #1: After this operation, 359 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap2 amd64 1:2.32-1ubuntu0.1 [15.8 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcap-dev amd64 1:2.32-1ubuntu0.1 [33.2 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libgc1c2 amd64 1:7.6.4-0.4ubuntu1 [83.9 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc4 amd64 10.5.0-1ubuntu1~20.04 [42.8 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [225 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 libllvm10 amd64 1:10.0.0-4ubuntu1 [15.3 MB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang1-10 amd64 1:10.0.0-4ubuntu1 [7571 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-common-10-dev amd64 1:10.0.0-4ubuntu1 [5012 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-10-dev amd64 1:10.0.0-4ubuntu1 [19.4 MB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-dev amd64 1:10.0-50~exp1 [2880 B] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 49.0 MB in 1s (45.1 MB/s) Step #1: Selecting previously unselected package libcap2:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17383 files and directories currently installed.) Step #1: Preparing to unpack .../00-libcap2_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: Preparing to unpack .../01-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libcap-dev:amd64. Step #1: Preparing to unpack .../02-libcap-dev_1%3a2.32-1ubuntu0.1_amd64.deb ... Step #1: Unpacking libcap-dev:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Selecting previously unselected package libgc1c2:amd64. Step #1: Preparing to unpack .../03-libgc1c2_1%3a7.6.4-0.4ubuntu1_amd64.deb ... Step #1: Unpacking libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Selecting previously unselected package libobjc4:amd64. Step #1: Preparing to unpack .../04-libobjc4_10.5.0-1ubuntu1~20.04_amd64.deb ... Step #1: Unpacking libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libobjc-9-dev:amd64. Step #1: Preparing to unpack .../05-libobjc-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libllvm10:amd64. Step #1: Preparing to unpack .../06-libllvm10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang1-10. Step #1: Preparing to unpack .../07-libclang1-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-common-10-dev. Step #1: Preparing to unpack .../08-libclang-common-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-10-dev. Step #1: Preparing to unpack .../09-libclang-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-dev. Step #1: Preparing to unpack .../10-libclang-dev_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking libclang-dev (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up libcap2:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up libcap-dev:amd64 (1:2.32-1ubuntu0.1) ... Step #1: Setting up libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang-dev (1:10.0-50~exp1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Removing intermediate container 2a2754bdd9fe Step #1: ---> 8bcfd0a0c68f Step #1: Step 4/4 : COPY build.sh $SRC Step #1: ---> fe238c5b4308 Step #1: Successfully built fe238c5b4308 Step #1: Successfully tagged gcr.io/oss-fuzz/crosvm:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/crosvm Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file7TJhDM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/crosvm/.git Step #2 - "srcmap": + GIT_DIR=/src/crosvm Step #2 - "srcmap": + cd /src/crosvm Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://chromium.googlesource.com/crosvm/crosvm Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=324877dbd8befa888ce545a5e1773fb35f93d3c0 Step #2 - "srcmap": + jq_inplace /tmp/file7TJhDM '."/src/crosvm" = { type: "git", url: "https://chromium.googlesource.com/crosvm/crosvm", rev: "324877dbd8befa888ce545a5e1773fb35f93d3c0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filexiyIBc Step #2 - "srcmap": + cat /tmp/file7TJhDM Step #2 - "srcmap": + jq '."/src/crosvm" = { type: "git", url: "https://chromium.googlesource.com/crosvm/crosvm", rev: "324877dbd8befa888ce545a5e1773fb35f93d3c0" }' Step #2 - "srcmap": + mv /tmp/filexiyIBc /tmp/file7TJhDM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file7TJhDM Step #2 - "srcmap": + rm /tmp/file7TJhDM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/crosvm": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://chromium.googlesource.com/crosvm/crosvm", Step #2 - "srcmap": "rev": "324877dbd8befa888ce545a5e1773fb35f93d3c0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd crosvm Step #3 - "compile-libfuzzer-coverage-x86_64": + env -u SRC cargo +nightly fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded enumn v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.24 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-traits v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-project-lite v0.2.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded fastrand v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-task v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libloading v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parking_lot v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-deque v0.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded p9_wire_format_derive v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded slab v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.0.73 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v1.0.103 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex-syntax v0.6.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.150 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded chrono v0.4.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded protobuf v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy-derive v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nix v0.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded regex v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bindgen v0.63.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded syn v2.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-util v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded nom v7.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_derive v1.0.140 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded zerocopy v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memchr v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rayon-core v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded intrusive-collections v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.140 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded p9 v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded env_logger v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded proc-macro2 v1.0.67 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded protobuf-codegen v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pkg-config v0.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-epoch v0.9.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded parking_lot_core v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded log v0.4.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded protobuf-parse v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cexpr v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-core v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded argh_derive v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_core v0.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded autocfg v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded termcolor v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lazycell v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ppv-lite86 v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded scopeguard v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded uuid v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded getrandom v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded argh v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded which v4.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded tempfile v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded anyhow v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded remain v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror v1.0.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded either v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded downcast-rs v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unicode-ident v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rustc-hash v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded quote v1.0.33 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v2.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded async-trait v0.1.56 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-channel v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded time v0.1.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-io v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded smallvec v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded humantime v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lazy_static v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded static_assertions v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded peeking_take_while v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded byteorder v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memoffset v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-macro v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded lock_api v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded paste v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded protobuf-support v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded atty v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num_cpus v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-sink v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded glob v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded thiserror-impl v1.0.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded remove_dir_all v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-utils v0.8.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memoffset v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded argh_shared v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded named-lock v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded num-integer v0.1.45 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memoffset v0.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded crossbeam-channel v0.5.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-executor v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_json v1.0.82 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded aho-corasick v0.7.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded memoffset v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded futures-task v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded clang-sys v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proc-macro2 v1.0.67 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unicode-ident v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling autocfg v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v1.0.103 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.150 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memchr v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror v1.0.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling either v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling log v0.4.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_derive v1.0.140 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex-syntax v0.6.27 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.140 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling glob v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-core v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pkg-config v0.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling minimal-lexical v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling anyhow v1.0.58 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bindgen v0.63.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-task v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-channel v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling peeking_take_while v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-sink v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-util v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rustc-hash v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lazycell v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-project-lite v0.2.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libloading v0.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling byteorder v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-io v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-trait v0.1.56 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_json v1.0.82 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling remove_dir_all v0.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fastrand v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling static_assertions v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling humantime v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling termcolor v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling sync v0.1.99 (/src/crosvm/common/sync) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling smallvec v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling slab v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-traits v0.2.15 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num-integer v0.1.45 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling scopeguard v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling argh_shared v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-utils v0.8.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memoffset v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling clang-sys v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bitflags v2.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memoffset v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-epoch v0.9.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling protobuf v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling paste v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling async-task v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling lock_api v0.4.9 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parking_lot_core v0.9.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon-core v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling aho-corasick v0.7.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nom v7.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling intrusive-collections v0.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling quote v1.0.33 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memoffset v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cros_tracing_types v0.1.0 (/src/crosvm/cros_tracing_types) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling memoffset v0.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling syn v2.0.37 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling which v4.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling num_cpus v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-channel v0.5.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling tempfile v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.24 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rutabaga_gfx v0.1.2 (/src/crosvm/rutabaga_gfx) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crossbeam-deque v0.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling downcast-rs v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ppv-lite86 v0.2.16 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling parking_lot v0.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.0.73 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crosvm_cli v0.1.0 (/src/crosvm/crosvm_cli) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling regex v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling getrandom v0.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling atty v0.2.14 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling time v0.1.44 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling nix v0.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling uuid v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_core v0.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand_chacha v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rayon v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling rand v0.8.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling env_logger v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cexpr v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy-derive v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base_event_token_derive v0.1.0 (/src/crosvm/base/base_event_token_derive) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bit_field_derive v0.1.0 (/src/crosvm/bit_field/bit_field_derive) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jail v0.1.0 (/src/crosvm/jail) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling bit_field v0.1.0 (/src/crosvm/bit_field) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling zerocopy v0.7.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling acpi_tables v0.1.0 (/src/crosvm/acpi_tables) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling thiserror-impl v1.0.38 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling remain v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-macro v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling argh_derive v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling enumn v0.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling p9_wire_format_derive v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling protobuf-support v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling named-lock v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cros_fdt v0.1.0 (/src/crosvm/cros_fdt) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling argh v0.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling prebuilts v0.1.0 (/src/crosvm/prebuilts) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `shm::round_up_to_page_size` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> rutabaga_gfx/src/rutabaga_os/sys/linux/mod.rs:10:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 10 | pub use shm::round_up_to_page_size; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `descriptor::AsRawDescriptors` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> rutabaga_gfx/src/rutabaga_os/mod.rs:11:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 11 | pub use descriptor::AsRawDescriptors; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_keyvalue_derive v0.1.0 (/src/crosvm/serde_keyvalue/serde_keyvalue_derive) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling net_util v0.1.0 (/src/crosvm/net_util) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling minijail-sys v0.0.14 (/src/crosvm/third_party/minijail/rust/minijail-sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures-executor v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling futures v0.3.21 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling protobuf-parse v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling data_model v0.1.1-alpha.1 (/src/crosvm/common/data_model) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling audio_streams v0.1.0 (/src/crosvm/common/audio_streams) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling chrono v0.4.19 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_keyvalue v0.1.0 (/src/crosvm/serde_keyvalue) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vm_control_product v0.1.0 (/src/crosvm/vendor/generic/vm_control) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling balloon_control v0.1.0 (/src/crosvm/common/balloon_control) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling p9 v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling protobuf-codegen v3.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling proto_build_tools v0.1.0 (/src/crosvm/proto_build_tools) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling power_monitor v0.1.0 (/src/crosvm/power_monitor) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling minijail v0.2.3 (/src/crosvm/third_party/minijail/rust/minijail) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling base v0.1.0 (/src/crosvm/base) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `descriptor::*` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> base/src/sys/linux/mod.rs:67:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 67 | pub use descriptor::*; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `timer::*` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> base/src/sys/linux/mod.rs:106:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 106 | pub use timer::*; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: ambiguous glob re-exports Step #3 - "compile-libfuzzer-coverage-x86_64":  --> base/src/sys.rs:19:13 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 19 |  pub use super::linux::*; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^ the name `file_traits` in the type namespace is first re-exported here Step #3 - "compile-libfuzzer-coverage-x86_64": ... Step #3 - "compile-libfuzzer-coverage-x86_64": 23 |  pub use super::unix::*; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  -------------- but the name `file_traits` in the type namespace is also re-exported here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(ambiguous_glob_reexports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling io_uring v0.1.1 (/src/crosvm/io_uring) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cros_tracing v0.1.0 (/src/crosvm/cros_tracing) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling kvm_sys v0.1.0 (/src/crosvm/kvm_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling resources v0.1.0 (/src/crosvm/resources) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling net_sys v0.1.0 (/src/crosvm/net_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling virtio_sys v0.1.0 (/src/crosvm/virtio_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling usb_sys v0.1.0 (/src/crosvm/usb_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling linux_input_sys v0.1.0 (/src/crosvm/linux_input_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vmm_vhost v0.1.0 (/src/crosvm/third_party/vmm_vhost) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling audio_util v0.1.0 (/src/crosvm/audio_util) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vfio_sys v0.1.0 (/src/crosvm/vfio_sys) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling fuse v0.1.0 (/src/crosvm/fuse) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling usb_util v0.1.0 (/src/crosvm/usb_util) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cros_async v0.1.1 (/src/crosvm/cros_async) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vm_memory v0.1.0 (/src/crosvm/vm_memory) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `rutabaga_gfx` (lib) generated 2 warnings (run `cargo fix --lib -p rutabaga_gfx` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling kvm v0.1.0 (/src/crosvm/kvm) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling swap v0.1.0 (/src/crosvm/swap) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vhost v0.1.0 (/src/crosvm/vhost) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling disk v0.1.0 (/src/crosvm/disk) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling kernel_loader v0.1.0 (/src/crosvm/kernel_loader) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hypervisor v0.1.0 (/src/crosvm/hypervisor) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling vm_control v0.1.0 (/src/crosvm/vm_control) Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling devices v0.1.0 (/src/crosvm/devices) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::acpi::DeviceVcfgRegister` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:30:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 30 | pub use self::acpi::DeviceVcfgRegister; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::acpi::DsmMethod` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:31:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 31 | pub use self::acpi::DsmMethod; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::acpi::PowerResourceMethod` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:33:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 33 | pub use self::acpi::PowerResourceMethod; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::pci_configuration::PciProgrammingInterface` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:57:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 57 | pub use self::pci_configuration::PciProgrammingInterface; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::pci_configuration::PciSerialBusSubClass` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:58:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 58 | pub use self::pci_configuration::PciSerialBusSubClass; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::pci_configuration::CAPABILITY_LIST_HEAD_OFFSET` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:60:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 60 | pub use self::pci_configuration::CAPABILITY_LIST_HEAD_OFFSET; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `self::pci_device::IoEventError as PciIoEventError` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/pci/mod.rs:63:9 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 63 | pub use self::pci_device::IoEventError as PciIoEventError; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: unused import: `base::FromRawDescriptor` Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/virtio/wl.rs:75:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 75 | use base::FromRawDescriptor; Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `base` (lib) generated 3 warnings (run `cargo fix --lib -p base` to apply 2 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": warning: function `create_stop_oneshot` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/virtio/mod.rs:305:15 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 305 | pub(crate) fn create_stop_oneshot(tx_vec: &mut Vec>) -> oneshot::Receiver<()> { Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: enum `StoppedWorker` is never used Step #3 - "compile-libfuzzer-coverage-x86_64":  --> devices/src/virtio/mod.rs:313:17 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 313 | pub(crate) enum StoppedWorker { Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling crosvm-fuzz v0.0.1 (/src/crosvm/fuzz) Step #3 - "compile-libfuzzer-coverage-x86_64": error: internal compiler error: compiler/rustc_codegen_llvm/src/coverageinfo/mapgen.rs:98:17: A used function should have had coverage mapping data but did not: _RNCNCINvNtNtNtCsc5Vp0aQmeID_7devices6virtio5block12asynchronous10run_workerINtNtNtCsdijJ5Wqo6zD_4core6future7pending7PendingINtNtB1i_6result6ResultuNtCseDiTJ3ZyPMl_6anyhow5ErrorEEE00Bc_ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": thread 'rustc' panicked at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/compiler/rustc_errors/src/lib.rs:1113:75: Step #3 - "compile-libfuzzer-coverage-x86_64": Box Step #3 - "compile-libfuzzer-coverage-x86_64": stack backtrace: Step #3 - "compile-libfuzzer-coverage-x86_64": 0: 0x7f3b6789d45c - std::backtrace_rs::backtrace::libunwind::trace::h647894ced53dc4d7 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/../../backtrace/src/backtrace/libunwind.rs:104:5 Step #3 - "compile-libfuzzer-coverage-x86_64": 1: 0x7f3b6789d45c - std::backtrace_rs::backtrace::trace_unsynchronized::hacbec77cf1823209 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/../../backtrace/src/backtrace/mod.rs:66:5 Step #3 - "compile-libfuzzer-coverage-x86_64": 2: 0x7f3b6789d45c - std::sys_common::backtrace::_print_fmt::h75e444b2b638aaec Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/sys_common/backtrace.rs:68:5 Step #3 - "compile-libfuzzer-coverage-x86_64": 3: 0x7f3b6789d45c - ::fmt::h122a7471b38fc565 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/sys_common/backtrace.rs:44:22 Step #3 - "compile-libfuzzer-coverage-x86_64": 4: 0x7f3b678f04a0 - core::fmt::rt::Argument::fmt::he98a84e6eb169f9f Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/core/src/fmt/rt.rs:142:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 5: 0x7f3b678f04a0 - core::fmt::write::he26188aecf8512b0 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/core/src/fmt/mod.rs:1120:17 Step #3 - "compile-libfuzzer-coverage-x86_64": 6: 0x7f3b678912bf - std::io::Write::write_fmt::h365ff6ed21d531ac Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/io/mod.rs:1810:15 Step #3 - "compile-libfuzzer-coverage-x86_64": 7: 0x7f3b6789d244 - std::sys_common::backtrace::_print::h71769e173a4e75a6 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/sys_common/backtrace.rs:47:5 Step #3 - "compile-libfuzzer-coverage-x86_64": 8: 0x7f3b6789d244 - std::sys_common::backtrace::print::h3013491173a698a2 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/sys_common/backtrace.rs:34:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 9: 0x7f3b6789fed7 - std::panicking::default_hook::{{closure}}::he5540779468870f9 Step #3 - "compile-libfuzzer-coverage-x86_64": 10: 0x7f3b6789fc3f - std::panicking::default_hook::h0ccbde576110e8be Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/panicking.rs:292:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 11: 0x7f3b6a62b7f0 - std[1800e4c5f0dedc14]::panicking::update_hook::>::{closure#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 12: 0x7f3b678a0618 - as core::ops::function::Fn>::call::hb5aed85006908a0e Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/alloc/src/boxed.rs:2029:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 13: 0x7f3b678a0618 - std::panicking::rust_panic_with_hook::h382e764f213a869a Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/panicking.rs:783:13 Step #3 - "compile-libfuzzer-coverage-x86_64": 14: 0x7f3b6a663ca4 - std[1800e4c5f0dedc14]::panicking::begin_panic::::{closure#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 15: 0x7f3b6a660136 - std[1800e4c5f0dedc14]::sys_common::backtrace::__rust_end_short_backtrace::::{closure#0}, !> Step #3 - "compile-libfuzzer-coverage-x86_64": 16: 0x7f3b6a65b456 - std[1800e4c5f0dedc14]::panicking::begin_panic:: Step #3 - "compile-libfuzzer-coverage-x86_64": 17: 0x7f3b6a66ee49 - ::diagnostic_builder_emit_producing_guarantee Step #3 - "compile-libfuzzer-coverage-x86_64": 18: 0x7f3b6aa4b0f5 - ::bug:: Step #3 - "compile-libfuzzer-coverage-x86_64": 19: 0x7f3b6aae5a0d - rustc_middle[c97c0cf825d2b54a]::util::bug::opt_span_bug_fmt::::{closure#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 20: 0x7f3b6aacecfa - rustc_middle[c97c0cf825d2b54a]::ty::context::tls::with_opt::::{closure#0}, !>::{closure#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 21: 0x7f3b6aaceb78 - rustc_middle[c97c0cf825d2b54a]::ty::context::tls::with_context_opt::::{closure#0}, !>::{closure#0}, !> Step #3 - "compile-libfuzzer-coverage-x86_64": 22: 0x7f3b68a59fb0 - rustc_middle[c97c0cf825d2b54a]::util::bug::bug_fmt Step #3 - "compile-libfuzzer-coverage-x86_64": 23: 0x7f3b6a4ddfbd - rustc_codegen_llvm[5fc9370d703f1ed9]::coverageinfo::mapgen::finalize Step #3 - "compile-libfuzzer-coverage-x86_64": 24: 0x7f3b6c8a42d5 - rustc_codegen_llvm[5fc9370d703f1ed9]::base::compile_codegen_unit::module_codegen Step #3 - "compile-libfuzzer-coverage-x86_64": 25: 0x7f3b6c90deab - ::compile_codegen_unit Step #3 - "compile-libfuzzer-coverage-x86_64": 26: 0x7f3b6c72ac00 - rustc_codegen_ssa[55026893025ba6c1]::base::codegen_crate:: Step #3 - "compile-libfuzzer-coverage-x86_64": 27: 0x7f3b6c72a47a - ::codegen_crate Step #3 - "compile-libfuzzer-coverage-x86_64": 28: 0x7f3b6c728645 - rustc_interface[7f88154c83aaa02c]::passes::start_codegen Step #3 - "compile-libfuzzer-coverage-x86_64": 29: 0x7f3b6c727d9c - ::codegen_and_build_linker Step #3 - "compile-libfuzzer-coverage-x86_64": 30: 0x7f3b6c92792d - rustc_interface[7f88154c83aaa02c]::interface::run_compiler::, rustc_driver_impl[846be4ce6ca2bc76]::run_compiler::{closure#0}>::{closure#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 31: 0x7f3b6c8b9edf - std[1800e4c5f0dedc14]::sys_common::backtrace::__rust_begin_short_backtrace::, rustc_driver_impl[846be4ce6ca2bc76]::run_compiler::{closure#0}>::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>>::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>>::{closure#0}::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>> Step #3 - "compile-libfuzzer-coverage-x86_64": 32: 0x7f3b6c8b9d09 - <::spawn_unchecked_, rustc_driver_impl[846be4ce6ca2bc76]::run_compiler::{closure#0}>::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>>::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>>::{closure#0}::{closure#0}, core[9adc4209bd10aa1b]::result::Result<(), rustc_span[4a07b0ba3a7f3540]::ErrorGuaranteed>>::{closure#1} as core[9adc4209bd10aa1b]::ops::function::FnOnce<()>>::call_once::{shim:vtable#0} Step #3 - "compile-libfuzzer-coverage-x86_64": 33: 0x7f3b678aa4a5 - as core::ops::function::FnOnce>::call_once::h45ba3c5d42899d7c Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/alloc/src/boxed.rs:2015:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 34: 0x7f3b678aa4a5 - as core::ops::function::FnOnce>::call_once::h022011ecbfe93669 Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/alloc/src/boxed.rs:2015:9 Step #3 - "compile-libfuzzer-coverage-x86_64": 35: 0x7f3b678aa4a5 - std::sys::unix::thread::Thread::new::thread_start::hff906bf5eb91cb9e Step #3 - "compile-libfuzzer-coverage-x86_64": at /rustc/06e02d5b259c1e88cbf0c74366d9e0a4c7cfd6d9/library/std/src/sys/unix/thread.rs:108:17 Step #3 - "compile-libfuzzer-coverage-x86_64": 36: 0x7f3b677bf609 - start_thread Step #3 - "compile-libfuzzer-coverage-x86_64": 37: 0x7f3b676e2353 - clone Step #3 - "compile-libfuzzer-coverage-x86_64": 38: 0x0 - Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": note: we would appreciate a bug report: https://github.com/rust-lang/rust/issues/new?labels=C-bug%2C+I-ICE%2C+T-compiler&template=ice.md Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": note: please attach the file at `/src/crosvm/rustc-ice-2023-12-10T07_46_24-2497.txt` to your bug report Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": note: compiler flags: --crate-type lib -C opt-level=3 -C panic=abort -C embed-bitcode=no -C overflow-checks=on -C passes=sancov-module -C llvm-args=-sanitizer-coverage-level=4 -C llvm-args=-sanitizer-coverage-inline-8bit-counters -C llvm-args=-sanitizer-coverage-pc-table -C llvm-args=-sanitizer-coverage-trace-compares -C link-dead-code -Z sanitizer=address -C llvm-args=-sanitizer-coverage-stack-depth -C codegen-units=1 -C debuginfo=1 -C force-frame-pointers -C instrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": note: some of the compiler flags provided by cargo are hidden Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": query stack during panic: Step #3 - "compile-libfuzzer-coverage-x86_64": end of query stack Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `devices` (lib) generated 10 warnings (run `cargo fix --lib -p devices` to apply 8 suggestions) Step #3 - "compile-libfuzzer-coverage-x86_64": error: could not compile `devices` (lib); 10 warnings emitted Step #3 - "compile-libfuzzer-coverage-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-coverage-x86_64": Error: failed to build fuzz script: ASAN_OPTIONS="detect_odr_violation=0" RUSTFLAGS="-Cpasses=sancov-module -Cllvm-args=-sanitizer-coverage-level=4 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters -Cllvm-args=-sanitizer-coverage-pc-table -Cllvm-args=-sanitizer-coverage-trace-compares --cfg fuzzing -Clink-dead-code -Zsanitizer=address -Cllvm-args=-sanitizer-coverage-stack-depth -C codegen-units=1 --cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++" "cargo" "build" "--manifest-path" "/src/crosvm/fuzz/Cargo.toml" "--target" "x86_64-unknown-linux-gnu" "--release" "--bins" Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image crosvm Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 crosvm Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1