starting build "67ef0476-f908-47fa-ab00-78aeeb611c4f"

FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626"
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Already have image (with digest): gcr.io/cloud-builders/docker
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Sending build context to Docker daemon  5.632kB

Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": latest: Pulling from oss-fuzz-base/base-builder-rust
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b549f31133a9: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d4dd822bbffb: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d8fc000f412: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3361395d6e44: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 48b5b52d0b6b: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 133d1078471d: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 067b043f6c3d: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b378ee38e924: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 56cba17d63ec: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0c2c0ffee9e9: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 87afe3e74a6f: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0dcbbd7b1e2b: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 96f172c7630c: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": c11c0e8d790b: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ea461ccc518a: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8464fcdf5650: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": be9c3055ce18: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 9e2aefad8bb5: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": e49cca9f06ca: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8c015615c97f: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d81dcfcb6dc: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d2ea0ce4f46f: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 067b043f6c3d: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b378ee38e924: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7f3d4930022b: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 96f172c7630c: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 56cba17d63ec: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 13a21c9fae89: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0c2c0ffee9e9: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 17afa181c115: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3361395d6e44: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7cc08c3a1dbf: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": c11c0e8d790b: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8464fcdf5650: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 87afe3e74a6f: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": fd9e54733f66: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": be9c3055ce18: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 688d1a420abf: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0dcbbd7b1e2b: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ea461ccc518a: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 73ea241ea4d8: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 133d1078471d: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 48b5b52d0b6b: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4c89e2ea8dbc: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7f3d4930022b: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 441d7463a69a: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 9e2aefad8bb5: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3fa465ac5942: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 17afa181c115: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 518907e5c0ad: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": e49cca9f06ca: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 326319e6c6d5: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 13a21c9fae89: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8c015615c97f: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7cc08c3a1dbf: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d3c8b77e4984: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 67846ae876b5: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d81dcfcb6dc: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 73ea241ea4d8: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 44506760bc19: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4c89e2ea8dbc: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": f3b60835fbba: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d2ea0ce4f46f: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": fd9e54733f66: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ac818fe500f7: Pulling fs layer
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 441d7463a69a: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 688d1a420abf: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3fa465ac5942: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 518907e5c0ad: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 326319e6c6d5: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d3c8b77e4984: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 44506760bc19: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ac818fe500f7: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 67846ae876b5: Waiting
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d8fc000f412: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d8fc000f412: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b549f31133a9: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b549f31133a9: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 48b5b52d0b6b: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 48b5b52d0b6b: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3361395d6e44: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3361395d6e44: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 133d1078471d: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 133d1078471d: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b378ee38e924: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d4dd822bbffb: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d4dd822bbffb: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 56cba17d63ec: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b549f31133a9: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 87afe3e74a6f: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 87afe3e74a6f: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0dcbbd7b1e2b: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0dcbbd7b1e2b: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 96f172c7630c: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 96f172c7630c: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": c11c0e8d790b: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": c11c0e8d790b: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ea461ccc518a: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ea461ccc518a: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0c2c0ffee9e9: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0c2c0ffee9e9: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8464fcdf5650: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8464fcdf5650: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 9e2aefad8bb5: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 9e2aefad8bb5: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": be9c3055ce18: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": be9c3055ce18: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": e49cca9f06ca: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": e49cca9f06ca: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8c015615c97f: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8c015615c97f: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d2ea0ce4f46f: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d81dcfcb6dc: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d81dcfcb6dc: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 13a21c9fae89: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7f3d4930022b: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7f3d4930022b: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 067b043f6c3d: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 067b043f6c3d: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 17afa181c115: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": fd9e54733f66: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7cc08c3a1dbf: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 688d1a420abf: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 688d1a420abf: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 73ea241ea4d8: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 73ea241ea4d8: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 441d7463a69a: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4c89e2ea8dbc: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4c89e2ea8dbc: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3fa465ac5942: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 326319e6c6d5: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 326319e6c6d5: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 518907e5c0ad: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d3c8b77e4984: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d3c8b77e4984: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 67846ae876b5: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 67846ae876b5: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d4dd822bbffb: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 44506760bc19: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 44506760bc19: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d8fc000f412: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": f3b60835fbba: Verifying Checksum
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": f3b60835fbba: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3361395d6e44: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 48b5b52d0b6b: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ac818fe500f7: Download complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 133d1078471d: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 067b043f6c3d: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": b378ee38e924: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 56cba17d63ec: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0c2c0ffee9e9: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 87afe3e74a6f: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0dcbbd7b1e2b: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 96f172c7630c: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": c11c0e8d790b: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ea461ccc518a: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8464fcdf5650: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": be9c3055ce18: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 9e2aefad8bb5: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": e49cca9f06ca: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 8c015615c97f: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4d81dcfcb6dc: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d2ea0ce4f46f: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7f3d4930022b: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 13a21c9fae89: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 17afa181c115: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 7cc08c3a1dbf: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": fd9e54733f66: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 688d1a420abf: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 73ea241ea4d8: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 4c89e2ea8dbc: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 441d7463a69a: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 3fa465ac5942: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 518907e5c0ad: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 326319e6c6d5: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": d3c8b77e4984: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 67846ae876b5: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 44506760bc19: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": f3b60835fbba: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": ac818fe500f7: Pull complete
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Digest: sha256:b572e2e8130b01c3d48a48d13e960a4c6f4377ee8477e91d1845b443ed34cf16
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> da1c13191d2f
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Step 2/5 : RUN apt-get update && apt-get install -y nasm
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> Running in a3ca50accd9b
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB]
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Fetched 128 kB in 1s (234 kB/s)
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Reading package lists...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Reading package lists...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Building dependency tree...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Reading state information...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": The following packages were automatically installed and are no longer required:
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":   autotools-dev libsigsegv2 m4
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Use 'apt autoremove' to remove them.
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": The following NEW packages will be installed:
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":   nasm
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Need to get 362 kB of archives.
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": After this operation, 3374 kB of additional disk space will be used.
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB]
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": debconf: delaying package configuration, since apt-utils is not installed
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Fetched 362 kB in 1s (472 kB/s)
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Selecting previously unselected package nasm.
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 17483 files and directories currently installed.)
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Preparing to unpack .../nasm_2.14.02-1_amd64.deb ...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Unpacking nasm (2.14.02-1) ...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Setting up nasm (2.14.02-1) ...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Removing intermediate container a3ca50accd9b
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> 4c352fd06451
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Step 3/5 : RUN git clone --depth 1 https://github.com/intel/vtpm-td.git
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> Running in a46ddb7510e0
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Cloning into 'vtpm-td'...
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Removing intermediate container a46ddb7510e0
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> b83eab9f2e31
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Step 4/5 : COPY build.sh $SRC/
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> 9a8bbc1ab1b5
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Step 5/5 : WORKDIR $SRC/vtpm-td
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> Running in b93a03bd337b
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Removing intermediate container b93a03bd337b
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626":  ---> 4917707eca13
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Successfully built 4917707eca13
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Successfully tagged gcr.io/oss-fuzz/vtpm-td:latest
Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/vtpm-td:latest
Finished Step #1 - "build-eddf629f-8c9f-400e-ba3f-9c0f57707626"
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/vtpm-td
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/fileFo5yuM
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ rust == \g\o ]]
Step #2 - "srcmap": ++ find /src -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/vtpm-td/.git
Step #2 - "srcmap": + GIT_DIR=/src/vtpm-td
Step #2 - "srcmap": + cd /src/vtpm-td
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/intel/vtpm-td.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=00a2f8619661a4a7ee26efd47fbb4c5efbcab869
Step #2 - "srcmap": + jq_inplace /tmp/fileFo5yuM '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "00a2f8619661a4a7ee26efd47fbb4c5efbcab869" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/file072Qlc
Step #2 - "srcmap": + cat /tmp/fileFo5yuM
Step #2 - "srcmap": + jq '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "00a2f8619661a4a7ee26efd47fbb4c5efbcab869" }'
Step #2 - "srcmap": + mv /tmp/file072Qlc /tmp/fileFo5yuM
Step #2 - "srcmap": ++ find /src -name .svn -type d
Step #2 - "srcmap": ++ find /src -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/fileFo5yuM
Step #2 - "srcmap": + rm /tmp/fileFo5yuM
Step #2 - "srcmap": {
Step #2 - "srcmap":   "/src/vtpm-td": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/intel/vtpm-td.git",
Step #2 - "srcmap":     "rev": "00a2f8619661a4a7ee26efd47fbb4c5efbcab869"
Step #2 - "srcmap":   }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1   -fno-omit-frame-pointer   -gline-tables-only   -Wno-error=enum-constexpr-conversion   -Wno-error=incompatible-function-pointer-types   -Wno-error=int-conversion   -Wno-error=deprecated-declarations   -Wno-error=implicit-function-declaration   -Wno-error=implicit-int   -Wno-error=vla-cxx-extension   -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1   -fno-omit-frame-pointer   -gline-tables-only   -Wno-error=enum-constexpr-conversion   -Wno-error=incompatible-function-pointer-types   -Wno-error=int-conversion   -Wno-error=deprecated-declarations   -Wno-error=implicit-function-declaration   -Wno-error=implicit-int   -Wno-error=vla-cxx-extension   -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + set -eox pipefail
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": +++ readlink -f '{}'
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/vtpm-td/{}' ';'
Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_CRATE_DIRS=/src/vtpm-td/./src/crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + git submodule update --init --recursive
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/rust-tpm-20-ref/ms-tpm-20-ref' (https://github.com/microsoft/ms-tpm-20-ref.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/rust-tpm-20-ref/openssl' (https://github.com/openssl/openssl.git) registered for path 'deps/rust-tpm-20-ref/openssl'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/rust-tpm-20-ref/smallc/musl' (https://git.musl-libc.org/git/musl) registered for path 'deps/rust-tpm-20-ref/smallc/musl'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/spdm-rs' (https://github.com/ccc-spdm-tools/spdm-rs.git) registered for path 'deps/spdm-rs'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/smallc/musl'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/td-shim'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx': checked out '0939077616b16d10f82652dd1361a5d4ed8b2e56'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dcap_source'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dnnl/dnnl'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/ippcp_internal/ipp-crypto'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/openmp/openmp_code'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/sgx-emm/emm_src'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out 'a4e3c1da8095d363ada0f5b7bec7850563e8139d'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out 'd9d13aaaf8889753fb58a13c2652c39b67c2076b'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '222b9d8cd246809cc8da041241824b0d0469000f'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref': checked out 'd638536d0fe01acd5e39ffa1bd100b3da82d92c7'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/wolfssl' (https://github.com/wolfSSL/wolfssl.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl': checked out '9c87f979a7f1d3a6d786b260653d566c1d31a1c4'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl': checked out '2cf4e90eaaf7402bf038b158dbdacd0a15561fb7'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'gost-engine' (https://github.com/gost-engine/engine) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'krb5' (https://github.com/krb5/krb5) registered for path 'deps/rust-tpm-20-ref/openssl/krb5'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'oqs-provider' (https://github.com/open-quantum-safe/oqs-provider.git) registered for path 'deps/rust-tpm-20-ref/openssl/oqs-provider'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'pyca.cryptography' (https://github.com/pyca/cryptography.git) registered for path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'python-ecdsa' (https://github.com/tlsfuzzer/python-ecdsa) registered for path 'deps/rust-tpm-20-ref/openssl/python-ecdsa'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'tlsfuzzer' (https://github.com/tlsfuzzer/tlsfuzzer) registered for path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'tlslite-ng' (https://github.com/tlsfuzzer/tlslite-ng) registered for path 'deps/rust-tpm-20-ref/openssl/tlslite-ng'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'wycheproof' (https://github.com/google/wycheproof) registered for path 'deps/rust-tpm-20-ref/openssl/wycheproof'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/krb5'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/oqs-provider'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/pyca-cryptography'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/python-ecdsa'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlsfuzzer'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlslite-ng'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/wycheproof'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine': checked out 'b2b4d629f100eaee9f5942a106b1ccefe85b8808'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'libprov' (https://github.com/provider-corner/libprov.git) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine/libprov'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov': checked out '8a126e09547630ef900177625626b6156052f0ee'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/krb5': checked out 'aa9b4a2a64046afd2fab7cb49c346295874a5fb6'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/oqs-provider': checked out '3f3d8a8cf331c73a26fe93a598273997cb54eb4f'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography': checked out 'c18d0567386414efa3caef7ed586c4ca75bf3a8b'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/python-ecdsa': checked out '4de8d5bf89089d1140eb99aa5d7eb2dc8e6337b6'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer': checked out 'dbd56c149072e656ca8d6a43a59588f3e7513da2'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlslite-ng': checked out '771e9f59d639dbb0e2fa8e646c8e588405d3903e'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/wycheproof': checked out '2196000605e45d91097147c9c71f26b72af58003'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/rust-tpm-20-ref/smallc/musl': checked out 'f5f55d6589940fd2c2188d76686efe3a530e64e0'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/spdm-rs': checked out 'f42eaf4680da0b0684ec1b9d64b7e417f8ff8160'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/spdm-rs/external/ring'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'external/webpki' (https://github.com/briansmith/webpki.git) registered for path 'deps/spdm-rs/external/webpki'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/ring'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/webpki'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/spdm-rs/external/ring': checked out '464d367252354418a2c17feb806876d4d89a8508'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/spdm-rs/external/webpki': checked out 'f84a538a5cd281ba1ffc0d54bbe5824cf5969703'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/td-shim': checked out '5f46c59f341f6b8df976ce6409ab81a0da39bcf1'
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring'
Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into '/src/vtpm-td/deps/td-shim/library/ring'...
Step #3 - "compile-libfuzzer-coverage-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508'
Step #3 - "compile-libfuzzer-coverage-x86_64": + bash sh_script/pre-build.sh
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/td-shim /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/td-shim/library/ring /src/vtpm-td/deps/td-shim
Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at 464d36725 0.17.6.
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file Cargo.toml
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file build.rs
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/td-shim
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/spdm-rs /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/spdm-rs/external/ring /src/vtpm-td/deps/spdm-rs
Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at 464d36725 0.17.6.
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/spdm-rs
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/spdm-rs/external/webpki /src/vtpm-td/deps/spdm-rs
Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at f84a538 0.22.4.
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/spdm-rs
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref /src/vtpm-td/deps/rust-tpm-20-ref
Step #3 - "compile-libfuzzer-coverage-x86_64": HEAD is now at d638536 Merge pull request #64 from jhand2/compiler_warnings
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file TPMCmd/tpm/src/support/Manufacture.c
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file TPMCmd/configure.ac
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file TPMCmd/tpm/include/Ossl/TpmToOsslMath.h
Step #3 - "compile-libfuzzer-coverage-x86_64": patching file TPMCmd/tpm/include/BaseTypes.h
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref
Step #3 - "compile-libfuzzer-coverage-x86_64": /src/vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]}
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ /src/vtpm-td/./src/crypto =~ deps ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building crate: /src/vtpm-td/./src/crypto'
Step #3 - "compile-libfuzzer-coverage-x86_64": Building crate: /src/vtpm-td/./src/crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/vtpm-td/./src/crypto
Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O
Step #3 - "compile-libfuzzer-coverage-x86_64":     Updating crates.io index
Step #3 - "compile-libfuzzer-coverage-x86_64":      Locking 100 packages to latest compatible versions
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding arbitrary v1.1.3 (latest: v1.4.1)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding bitflags v1.3.2 (latest: v2.9.1)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding conquer-once v0.3.2 (latest: v0.4.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding const-oid v0.9.6 (latest: v0.10.1)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding getrandom v0.2.16 (latest: v0.3.3)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding scroll v0.10.2 (latest: v0.13.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding scroll_derive v0.10.5 (latest: v0.13.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding serde v1.0.198 (latest: v1.0.219)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding serde_derive v1.0.198 (latest: v1.0.219)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding spin v0.9.8 (latest: v0.10.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding syn v1.0.109 (latest: v2.0.103)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding volatile v0.4.6 (latest: v0.6.1)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding wasi v0.11.1+wasi-snapshot-preview1 (latest: v0.14.2+wasi-0.2.4)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows-sys v0.48.0 (latest: v0.60.2)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows-sys v0.59.0 (latest: v0.60.2)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows-targets v0.48.5 (latest: v0.53.2)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows-targets v0.52.6 (latest: v0.53.2)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_aarch64_gnullvm v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_aarch64_msvc v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_aarch64_msvc v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_i686_gnu v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_i686_gnu v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_i686_gnullvm v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_i686_msvc v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_i686_msvc v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_gnu v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_gnu v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_gnullvm v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_msvc v0.48.5 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding windows_x86_64_msvc v0.52.6 (latest: v0.53.0)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding wit-bindgen-rt v0.39.0 (latest: v0.42.1)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding x86_64 v0.14.13 (latest: v0.15.2)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding zerocopy v0.7.35 (latest: v0.8.25)
Step #3 - "compile-libfuzzer-coverage-x86_64":       Adding zerocopy-derive v0.7.35 (latest: v0.8.25)
Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ...
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded bit_field v0.10.2
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded autocfg v1.4.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded byteorder v1.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded bitflags v2.9.1
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded bitflags v1.3.2
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded async-trait v0.1.88
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded arbitrary v1.1.3
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded bytes v1.10.1
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded ryu v1.0.20
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded maybe-async v0.2.10
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded zeroize_derive v1.4.2
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded conquer-once v0.3.2
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded zeroize v1.8.1
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded scroll_derive v0.10.5
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded shlex v1.3.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded volatile v0.4.6
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded zerocopy-derive v0.7.35
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded unicode-ident v1.0.18
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded serde_derive v1.0.198
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded x86_64 v0.14.13
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded libfuzzer-sys v0.4.9
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-util v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded cc v1.2.27
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded zerocopy v0.7.35
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded serde_json v1.0.140
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded der v0.7.10
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded memchr v2.7.5
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded syn v1.0.109
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded scroll v0.10.2
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded syn v2.0.103
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded proc-macro2 v1.0.95
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded log v0.4.27
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded cfg-if v1.0.1
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded spin v0.9.8
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded itoa v1.0.15
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-sink v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded const-oid v0.9.6
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded conquer-util v0.3.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded untrusted v0.9.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded scopeguard v1.2.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded rustversion v1.0.21
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-channel v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded serde v1.0.198
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded der_derive v0.7.3
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded pin-utils v0.1.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded pin-project-lite v0.2.16
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded lock_api v0.4.13
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded jobserver v0.1.33
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded lazy_static v1.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-task v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-io v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded quote v1.0.40
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded getrandom v0.2.16
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded futures-core v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":   Downloaded libc v0.2.173
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling proc-macro2 v1.0.95
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling unicode-ident v1.0.18
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling libc v0.2.173
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling autocfg v1.4.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling shlex v1.3.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling scopeguard v1.2.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling serde v1.0.198
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling serde_json v1.0.140
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling syn v1.0.109
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling itoa v1.0.15
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-sink v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-core v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling ryu v1.0.20
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling cfg-if v1.0.1
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling rustversion v1.0.21
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling memchr v2.7.5
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-task v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling pin-project-lite v0.2.16
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling pin-utils v0.1.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling untrusted v0.9.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling conquer-util v0.3.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling bit_field v0.10.2
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling log v0.4.27
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-io v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling bitflags v2.9.1
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling volatile v0.4.6
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling codec v0.2.2 (/src/vtpm-td/deps/spdm-rs/codec)
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling byteorder v1.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling bytes v1.10.1
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling bitflags v1.3.2
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling const-oid v0.9.6
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling arbitrary v1.1.3
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-channel v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling conquer-once v0.3.2
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures-util v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling lock_api v0.4.13
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling quote v1.0.40
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling spin v0.9.8
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling syn v2.0.103
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling x86_64 v0.14.13
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling lazy_static v1.5.0
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling jobserver v0.1.33
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling getrandom v0.2.16
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling cc v1.2.27
Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0053]: method `steps_between` has an incompatible type for trait
Step #3 - "compile-libfuzzer-coverage-x86_64":    --> /rust/registry/src/index.crates.io-6f17d22bba15001f/x86_64-0.14.13/src/addr.rs:387:51
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64": 387 |     fn steps_between(start: &Self, end: &Self) -> (usize, Option<usize>) {
Step #3 - "compile-libfuzzer-coverage-x86_64":     |                                                   ^^^^^^^^^^^^^^^^^^^^^^ expected `Option<usize>`, found `(usize, Option<usize>)`
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64":     = note: expected signature `fn(&addr::VirtAddr, &addr::VirtAddr) -> Option<usize>`
Step #3 - "compile-libfuzzer-coverage-x86_64":                found signature `fn(&addr::VirtAddr, &addr::VirtAddr) -> (usize, Option<usize>)`
Step #3 - "compile-libfuzzer-coverage-x86_64": help: change the output type to match the trait
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64": 387 |     fn steps_between(start: &Self, end: &Self) -> Option<usize> {
Step #3 - "compile-libfuzzer-coverage-x86_64":     |                                                   ~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0053]: method `steps_between` has an incompatible type for trait
Step #3 - "compile-libfuzzer-coverage-x86_64":    --> /rust/registry/src/index.crates.io-6f17d22bba15001f/x86_64-0.14.13/src/structures/paging/page.rs:284:51
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64": 284 |     fn steps_between(start: &Self, end: &Self) -> (usize, Option<usize>) {
Step #3 - "compile-libfuzzer-coverage-x86_64":     |                                                   ^^^^^^^^^^^^^^^^^^^^^^ expected `Option<usize>`, found `(usize, Option<usize>)`
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64":     = note: expected signature `fn(&Page<_>, &Page<_>) -> Option<usize>`
Step #3 - "compile-libfuzzer-coverage-x86_64":                found signature `fn(&Page<_>, &Page<_>) -> (usize, Option<usize>)`
Step #3 - "compile-libfuzzer-coverage-x86_64": help: change the output type to match the trait
Step #3 - "compile-libfuzzer-coverage-x86_64":     |
Step #3 - "compile-libfuzzer-coverage-x86_64": 284 |     fn steps_between(start: &Self, end: &Self) -> Option<usize> {
Step #3 - "compile-libfuzzer-coverage-x86_64":     |                                                   ~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":    Compiling futures v0.3.31
Step #3 - "compile-libfuzzer-coverage-x86_64": For more information about this error, try `rustc --explain E0053`.
Step #3 - "compile-libfuzzer-coverage-x86_64": error: could not compile `x86_64` (lib) due to 2 previous errors
Step #3 - "compile-libfuzzer-coverage-x86_64": warning: build failed, waiting for other jobs to finish...
Step #3 - "compile-libfuzzer-coverage-x86_64": ********************************************************************************
Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build.
Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run:
Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 vtpm-td
Step #3 - "compile-libfuzzer-coverage-x86_64": ********************************************************************************
Finished Step #3 - "compile-libfuzzer-coverage-x86_64"
ERROR
ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1