starting build "774c6aa5-fb71-43da-8067-8660cf59bfb3" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 6becd2001539: Pulling fs layer Step #1: 22d4835417b0: Pulling fs layer Step #1: 601a9cbfd137: Pulling fs layer Step #1: 972df7da24e8: Pulling fs layer Step #1: 535ecd0613d1: Pulling fs layer Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: c19b7fe83e8a: Pulling fs layer Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: bcf869ca811e: Pulling fs layer Step #1: 4a49dc7a9851: Pulling fs layer Step #1: 4f27abcdaf5d: Waiting Step #1: de9ad109123c: Pulling fs layer Step #1: ec67c84a6d76: Waiting Step #1: d74dccfeea37: Pulling fs layer Step #1: 9650ce23f886: Pulling fs layer Step #1: 81adce140048: Waiting Step #1: eaeb815cd75a: Pulling fs layer Step #1: 1eaaa1542342: Waiting Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: 11c03f65d6c1: Pulling fs layer Step #1: 6becd2001539: Waiting Step #1: 8bb7dd1116ca: Waiting Step #1: 22d4835417b0: Waiting Step #1: 49c2287c71a0: Pulling fs layer Step #1: 601a9cbfd137: Waiting Step #1: 4a49dc7a9851: Waiting Step #1: da4104990ff0: Waiting Step #1: bcf869ca811e: Waiting Step #1: b46b6cdbb6f2: Waiting Step #1: 972df7da24e8: Waiting Step #1: de9ad109123c: Waiting Step #1: 16949380c6e4: Waiting Step #1: d74dccfeea37: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: c19b7fe83e8a: Waiting Step #1: 49c2287c71a0: Waiting Step #1: 9650ce23f886: Waiting Step #1: eaeb815cd75a: Waiting Step #1: 50e1ee57936a: Waiting Step #1: 23e3013e5b98: Waiting Step #1: 29a663a40ba4: Waiting Step #1: c0d18e8fb1fa: Waiting Step #1: e530a9eecf2b: Waiting Step #1: 535ecd0613d1: Waiting Step #1: a7d3a0578149: Waiting Step #1: d57e2535d3c0: Waiting Step #1: 38da3118a46e: Verifying Checksum Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: 1fb4fb3d2b01: Verifying Checksum Step #1: 1fb4fb3d2b01: Download complete Step #1: 51df0d6876cd: Verifying Checksum Step #1: 51df0d6876cd: Download complete Step #1: 23e3013e5b98: Download complete Step #1: 50e1ee57936a: Verifying Checksum Step #1: 50e1ee57936a: Download complete Step #1: b549f31133a9: Pull complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: 81adce140048: Verifying Checksum Step #1: 81adce140048: Download complete Step #1: b46b6cdbb6f2: Verifying Checksum Step #1: b46b6cdbb6f2: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Verifying Checksum Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Verifying Checksum Step #1: 535ecd0613d1: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: da4104990ff0: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: c19b7fe83e8a: Download complete Step #1: 3c6277aa8e2b: Verifying Checksum Step #1: 3c6277aa8e2b: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: 9650ce23f886: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: eaeb815cd75a: Verifying Checksum Step #1: eaeb815cd75a: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 3ccdc7b565ee: Verifying Checksum Step #1: 3ccdc7b565ee: Download complete Step #1: 38da3118a46e: Pull complete Step #1: 11c03f65d6c1: Verifying Checksum Step #1: 11c03f65d6c1: Download complete Step #1: ec67c84a6d76: Pull complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: 49c2287c71a0: Verifying Checksum Step #1: 49c2287c71a0: Download complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: 49c2287c71a0: Pull complete Step #1: Digest: sha256:d197b1cd6ac57584187f882e55d98a10e12dec7a9bd66814f64c98346701dfb1 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 3146d6ba31f5 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y nasm llvm clang Step #1: ---> Running in b45d6d0abc0f Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (239 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: binfmt-support clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: Suggested packages: Step #1: clang-10-doc ncurses-doc libomp-10-doc llvm-10-doc python3-doc python3-tk Step #1: python3-venv python3-setuptools python-pygments-doc ttf-bitstream-vera Step #1: python3.8-venv python3.8-doc Step #1: The following NEW packages will be installed: Step #1: binfmt-support clang clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support nasm python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: 0 upgraded, 42 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 84.4 MB of archives. Step #1: After this operation, 505 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.13 [720 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.13 [1900 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.13 [1675 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.13 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 libyaml-0-2 amd64 0.2.2-1 [48.9 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.2 [130 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-yaml amd64 5.3.1-1ubuntu0.1 [136 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/universe amd64 binfmt-support amd64 2.2.0-2 [58.2 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libllvm10 amd64 1:10.0.0-4ubuntu1 [15.3 MB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-cpp10 amd64 1:10.0.0-4ubuntu1 [9944 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/main amd64 libgc1c2 amd64 1:7.6.4-0.4ubuntu1 [83.9 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc4 amd64 10.5.0-1ubuntu1~20.04 [42.8 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [225 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-common-10-dev amd64 1:10.0.0-4ubuntu1 [5012 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang1-10 amd64 1:10.0.0-4ubuntu1 [7571 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang-10 amd64 1:10.0.0-4ubuntu1 [66.9 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang amd64 1:10.0-50~exp1 [3276 B] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libncurses-dev amd64 6.2-0ubuntu2.1 [340 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp5-10 amd64 1:10.0.0-4ubuntu1 [300 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp-10-dev amd64 1:10.0.0-4ubuntu1 [47.7 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libtinfo-dev amd64 6.2-0ubuntu2.1 [972 B] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-runtime amd64 1:10.0.0-4ubuntu1 [180 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-runtime amd64 1:10.0-50~exp1 [2916 B] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 libpfm4 amd64 4.10.1+git20-g7700f49-2 [266 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10 amd64 1:10.0.0-4ubuntu1 [5214 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm amd64 1:10.0-50~exp1 [3880 B] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pygments all 2.3.1+dfsg-1ubuntu2.2 [579 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-tools amd64 1:10.0.0-4ubuntu1 [317 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-4 amd64 4.8.7-4build1 [6792 kB] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-dev amd64 4.8.7-4build1 [67.5 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-dev amd64 1:10.0.0-4ubuntu1 [26.0 MB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 84.4 MB in 5s (18.7 MB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17676 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.13_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18078 files and directories currently installed.) Step #1: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libyaml-0-2:amd64. Step #1: Preparing to unpack .../04-libyaml-0-2_0.2.2-1_amd64.deb ... Step #1: Unpacking libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Selecting previously unselected package python3-pkg-resources. Step #1: Preparing to unpack .../05-python3-pkg-resources_45.2.0-1ubuntu0.2_all.deb ... Step #1: Unpacking python3-pkg-resources (45.2.0-1ubuntu0.2) ... Step #1: Selecting previously unselected package python3-yaml. Step #1: Preparing to unpack .../06-python3-yaml_5.3.1-1ubuntu0.1_amd64.deb ... Step #1: Unpacking python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Selecting previously unselected package libpipeline1:amd64. Step #1: Preparing to unpack .../07-libpipeline1_1.5.2-2build1_amd64.deb ... Step #1: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Selecting previously unselected package binfmt-support. Step #1: Preparing to unpack .../08-binfmt-support_2.2.0-2_amd64.deb ... Step #1: Unpacking binfmt-support (2.2.0-2) ... Step #1: Selecting previously unselected package libllvm10:amd64. Step #1: Preparing to unpack .../09-libllvm10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-cpp10. Step #1: Preparing to unpack .../10-libclang-cpp10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libgc1c2:amd64. Step #1: Preparing to unpack .../11-libgc1c2_1%3a7.6.4-0.4ubuntu1_amd64.deb ... Step #1: Unpacking libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Selecting previously unselected package libobjc4:amd64. Step #1: Preparing to unpack .../12-libobjc4_10.5.0-1ubuntu1~20.04_amd64.deb ... Step #1: Unpacking libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libobjc-9-dev:amd64. Step #1: Preparing to unpack .../13-libobjc-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libclang-common-10-dev. Step #1: Preparing to unpack .../14-libclang-common-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang1-10. Step #1: Preparing to unpack .../15-libclang1-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang-10. Step #1: Preparing to unpack .../16-clang-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang. Step #1: Preparing to unpack .../17-clang_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking clang (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libncurses-dev:amd64. Step #1: Preparing to unpack .../18-libncurses-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package libomp5-10:amd64. Step #1: Preparing to unpack .../19-libomp5-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libomp-10-dev. Step #1: Preparing to unpack .../20-libomp-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libtinfo-dev:amd64. Step #1: Preparing to unpack .../21-libtinfo-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package llvm-10-runtime. Step #1: Preparing to unpack .../22-llvm-10-runtime_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm-runtime. Step #1: Preparing to unpack .../23-llvm-runtime_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm-runtime (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libpfm4:amd64. Step #1: Preparing to unpack .../24-libpfm4_4.10.1+git20-g7700f49-2_amd64.deb ... Step #1: Unpacking libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Selecting previously unselected package llvm-10. Step #1: Preparing to unpack .../25-llvm-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm. Step #1: Preparing to unpack .../26-llvm_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libffi-dev:amd64. Step #1: Preparing to unpack .../27-libffi-dev_3.3-4_amd64.deb ... Step #1: Unpacking libffi-dev:amd64 (3.3-4) ... Step #1: Selecting previously unselected package python3-pygments. Step #1: Preparing to unpack .../28-python3-pygments_2.3.1+dfsg-1ubuntu2.2_all.deb ... Step #1: Unpacking python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Selecting previously unselected package llvm-10-tools. Step #1: Preparing to unpack .../29-llvm-10-tools_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libz3-4:amd64. Step #1: Preparing to unpack .../30-libz3-4_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-4:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package libz3-dev:amd64. Step #1: Preparing to unpack .../31-libz3-dev_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package llvm-10-dev. Step #1: Preparing to unpack .../32-llvm-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package nasm. Step #1: Preparing to unpack .../33-nasm_2.14.02-1_amd64.deb ... Step #1: Unpacking nasm (2.14.02-1) ... Step #1: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Setting up libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Setting up libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libffi-dev:amd64 (3.3-4) ... Step #1: Setting up libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libz3-4:amd64 (4.8.7-4build1) ... Step #1: Setting up libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Setting up libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up binfmt-support (2.2.0-2) ... Step #1: invoke-rc.d: could not determine current runlevel Step #1: invoke-rc.d: policy-rc.d denied execution of start. Step #1: Setting up nasm (2.14.02-1) ... Step #1: Setting up libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.13) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Setting up libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Setting up llvm-runtime (1:10.0-50~exp1) ... Step #1: Setting up clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pkg-resources (45.2.0-1ubuntu0.2) ... Step #1: Setting up llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Setting up clang (1:10.0-50~exp1) ... Step #1: Setting up llvm (1:10.0-50~exp1) ... Step #1: Setting up llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container b45d6d0abc0f Step #1: ---> 234e89b1d6d8 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/intel/MigTD.git Step #1: ---> Running in 164e5653b1e1 Step #1: Cloning into 'MigTD'... Step #1: Removing intermediate container 164e5653b1e1 Step #1: ---> 912f00b54b1a Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> bbf15a601ef9 Step #1: Step 5/5 : WORKDIR $SRC/MigTD Step #1: ---> Running in 112fb2bf6fed Step #1: Removing intermediate container 112fb2bf6fed Step #1: ---> 7c58a5051229 Step #1: Successfully built 7c58a5051229 Step #1: Successfully tagged gcr.io/oss-fuzz/migtd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/migtd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filePFyE7P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/MigTD/.git Step #2 - "srcmap": + GIT_DIR=/src/MigTD Step #2 - "srcmap": + cd /src/MigTD Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/intel/MigTD.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=cc7099b6262d82160ab48fd8c5fa45e25e143360 Step #2 - "srcmap": + jq_inplace /tmp/filePFyE7P '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "cc7099b6262d82160ab48fd8c5fa45e25e143360" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileFmroy9 Step #2 - "srcmap": + cat /tmp/filePFyE7P Step #2 - "srcmap": + jq '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "cc7099b6262d82160ab48fd8c5fa45e25e143360" }' Step #2 - "srcmap": + mv /tmp/fileFmroy9 /tmp/filePFyE7P Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filePFyE7P Step #2 - "srcmap": + rm /tmp/filePFyE7P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/MigTD": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/intel/MigTD.git", Step #2 - "srcmap": "rev": "cc7099b6262d82160ab48fd8c5fa45e25e143360" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": +++ readlink -f '{}' Step #3 - "compile-libfuzzer-address-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/MigTD/{}' ';' Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_CRATE_DIRS='/src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/policy' Step #3 - "compile-libfuzzer-address-x86_64": + git submodule update --init --recursive Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim'... Step #3 - "compile-libfuzzer-address-x86_64": remote: Enumerating objects: 3, done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Counting objects: 50% (1/2) remote: Counting objects: 100% (2/2) remote: Counting objects: 100% (2/2), done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Compressing objects: 50% (1/2) remote: Compressing objects: 100% (2/2) remote: Compressing objects: 100% (2/2), done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Total 3 (delta 0), reused 0 (delta 0), pack-reused 1 (from 1) Step #3 - "compile-libfuzzer-address-x86_64": Unpacking objects: 33% (1/3) Unpacking objects: 66% (2/3) Unpacking objects: 100% (3/3) Unpacking objects: 100% (3/3), 1.97 KiB | 1.97 MiB/s, done. Step #3 - "compile-libfuzzer-address-x86_64": From https://github.com/intel/linux-sgx Step #3 - "compile-libfuzzer-address-x86_64": * branch e87b7ab876179442691ae5e58e68c81d4834c667 -> FETCH_HEAD Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx': checked out 'e87b7ab876179442691ae5e58e68c81d4834c667' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/cbor/libcbor' (https://github.com/PJK/libcbor.git) registered for path 'deps/linux-sgx/external/cbor/libcbor' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/mbedtls/mbedtls_code' (https://github.com/Mbed-TLS/mbedtls.git) registered for path 'deps/linux-sgx/external/mbedtls/mbedtls_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dnnl/dnnl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/ippcp_internal/ipp-crypto'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/mbedtls/mbedtls_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/openmp/openmp_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/sgx-emm/emm_src'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor': checked out 'efa6c0886bae46bdaef9b679f61f4b9d8bc296ae' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'doxygen-theme' (https://github.com/nnen/doxygen-theme.git) registered for path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor/doxygen-theme'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme': checked out '46111c61a9f49b7a9886127e679d4317478fab1c' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out '8f943ebcfbc3e4345998cf9a43470edeb5e501cb' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QVL' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationLibrary.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QuoteVerificationService' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationService.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/jwt-cpp' (https://github.com/Thalhammer/jwt-cpp.git) registered for path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/wasm-micro-runtime' (https://github.com/bytecodealliance/wasm-micro-runtime.git) registered for path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QVL'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/jwt-cpp'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL': checked out '16b7291a7a86e486fdfcf1dfb4be885c0cc00b4e' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService': checked out 'abebcaf098d40fe0aa405384ad841862da0cbc4b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp': checked out '4a537e969891dde542ad8b1a4a214955a83be29f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime': checked out '75936680662ddc31af6763daa55a622422f9e2f5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out '48d0e528cf948f32a0ed6e734e6e211470e5971a' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/mbedtls/mbedtls_code': checked out '1ec69067fa1351427f904362c1221b31538c8b57' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '893dcbc4e1452f9c20fbe31785a9054acc0cc867' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim': checked out '6262a40d898286a383b5a45c4dc7f9fdb1cc56c5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim/library/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": + bash sh_script/preparation.sh Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim/library/ring /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": patching file Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file build.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/vsock =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/vsock' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64": warning: /src/MigTD/src/devices/vsock/Cargo.toml: unused manifest key: dependencies.td-payload.feature Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Locking 110 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bit_field v0.9.0 (latest: v0.10.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitfield v0.13.2 (latest: v0.17.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.6.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.14 (latest: v0.6.5) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding raw-cpuid v10.7.0 (latest: v11.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spinning_top v0.2.5 (latest: v0.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.87) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86 v0.47.0 (latest: v0.52.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded anyhow v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded allocator-api2 v0.2.20 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded errno v0.3.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_json v1.0.133 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.87 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustix v0.38.41 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.22 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cpufeatures v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.41 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.133 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.20 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.87 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:478:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 478 |  let command = self.read_u16(0x4); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:479:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 479 |  let status = self.read_u16(0x6); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:513:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 513 |  let mut size = self.read_u64(current_bar_offset); Step #3 - "compile-libfuzzer-address-x86_64":  | ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:547:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 373 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 547 |  fn get_bar_size(&self, offset: u8) -> u32 { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 5 warnings (run `cargo fix --lib -p pci` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:44:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 | #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:155:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 155 |  #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (build script) generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/src/lib.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `feature` are: `default`, `der`, `lazy-accept`, `linked_list_allocator`, `log`, `main`, `ring`, `ring-hash`, `secure-boot`, `sha2-hash`, `spin`, `td-exception`, `td-loader`, `td-logger`, `td-paging`, `tdx`, `tdx-tdcall`, `x86`, and `x86_64` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `InterruptShadowStackTable` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-payload/src/arch/x86_64/cet.rs:31:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | struct InterruptShadowStackTable { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `td_payload::arch::idt::register` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:7:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | use td_payload::arch::idt::register; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `vector` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:17:26 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub fn register_callback(vector: u8, cb: unsafe extern "C" fn()) {} Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_vector` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `cb` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:17:38 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub fn register_callback(vector: u8, cb: unsafe extern "C" fn()) {} Step #3 - "compile-libfuzzer-address-x86_64":  | ^^ help: if this is intentional, prefix it with an underscore: `_cb` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-payload` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock` (lib) generated 3 warnings (run `cargo fix --lib -p vsock` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock-fuzz v0.0.0 (/src/MigTD/src/devices/vsock/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PciDevice` and `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:8:15 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | pub use pci::{get_fuzz_seed_address, PciDevice, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, and `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:9:18 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | pub use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `Mutex` and `once::Once` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:8:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use spin::{once::Once, Mutex}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `std::thread::spawn` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:9:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | use std::thread::spawn; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `Result` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:10:46 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | use virtio::{virtio_pci::VirtioPciTransport, Result}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:116:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 116 |  let device_addr = paddr - PAGE_SIZE as u64 + 0x100 + 0x200; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:20:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:21:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_2` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:31:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | const USED_LEN_VAL_2: u16 = 2; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_4` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:32:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 32 | const USED_LEN_VAL_4: u16 = 4; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_6` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:33:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 33 | const USED_LEN_VAL_6: u16 = 6; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `FIRST_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:36:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 | const FIRST_USED_LEN_OFFSET: u64 = 16; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TWO_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:37:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 | const TWO_USED_LEN_OFFSET: u64 = 24; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `THREE_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:38:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 | const THREE_USED_LEN_OFFSET: u64 = 32; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PAGE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:13:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | pub const PAGE_SIZE: usize = 0x1000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:15:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:16:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 16 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:18:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 18 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:22:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 22 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:113:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  let _ = register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:147:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  let _ = server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:148:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  let _ = server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock-fuzz` (bin "afl_vsock") generated 30 warnings (run `cargo fix --bin "afl_vsock"` to apply 7 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 15.67s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_vsock Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_vsock =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/virtio =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/virtio' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Locking 51 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bit_field v0.9.0 (latest: v0.10.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.6.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.87) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:478:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 478 |  let command = self.read_u16(0x4); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:479:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 479 |  let status = self.read_u16(0x6); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:513:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 513 |  let mut size = self.read_u64(current_bar_offset); Step #3 - "compile-libfuzzer-address-x86_64":  | ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:547:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 373 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 547 |  fn get_bar_size(&self, offset: u8) -> u32 { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 5 warnings (run `cargo fix --lib -p pci` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio-fuzz v0.0.0 (/src/MigTD/src/devices/virtio/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::fuzzlib::dma_alloc::virtio_dma_alloc` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use crate::fuzzlib::dma_alloc::virtio_dma_alloc; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `VirtQueueLayout` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 |  virtqueue::{VirtQueue, VirtQueueLayout, VirtqueueBuf}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:6:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use fuzzlib::{fuzz_virtio, get_fuzz_seed_address, init, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `pci::PciDevice` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:7:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | use pci::PciDevice; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, and `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:8:14 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:29:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let common_addr = 0; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:10:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:14:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:15:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:17:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:21:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:23:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:24:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:25:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:27:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `QUEUE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:28:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | pub const QUEUE_SIZE: usize = 16; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:34:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let _ = transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:35:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  let _ = transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:36:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let _ = transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:37:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  let _ = transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:38:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  let _ = transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:39:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  let _ = transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:40:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  let _ = transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:41:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  let _ = transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:42:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  let _ = transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:44:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  let _ = transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `virtio-fuzz` (bin "afl_virtio") generated 30 warnings (run `cargo fix --bin "afl_virtio"` to apply 6 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 5.77s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_virtio Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_virtio =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/crypto =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 73 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding rustls v0.23.12 (latest: v0.23.17) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.3+wasi-0.2.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-pki-types v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls v0.23.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.20 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.87 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1` and `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 4 warnings (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-fuzz v0.0.0 (/src/MigTD/src/crypto/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/x509.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "afl_x509") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "x509") generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 40.37s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_x509 Step #3 - "compile-libfuzzer-address-x86_64": x509' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=x509 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=crypto Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/x509 /workspace/out/libfuzzer-address-x86_64/crypto-x509 Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/migtd =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/migtd' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 124 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitfield v0.13.2 (latest: v0.17.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitflags v1.3.2 (latest: v2.6.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding conquer-once v0.3.2 (latest: v0.4.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.14 (latest: v0.6.5) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding raw-cpuid v10.7.0 (latest: v11.2.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding rustls v0.23.12 (latest: v0.23.17) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spinning_top v0.2.5 (latest: v0.3.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.87) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.2.7 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.3+wasi-0.2.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86 v0.47.0 (latest: v0.52.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.41 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.20 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.133 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd v0.4.7 (/src/MigTD/src/migtd) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.87 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-loader v0.1.0 (/src/MigTD/deps/td-shim/td-loader) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:44:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 | #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:155:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 155 |  #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (build script) generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/src/lib.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `feature` are: `default`, `der`, `lazy-accept`, `linked_list_allocator`, `log`, `main`, `ring`, `ring-hash`, `secure-boot`, `sha2-hash`, `spin`, `td-exception`, `td-loader`, `td-logger`, `td-paging`, `tdx`, `tdx-tdcall`, `x86`, and `x86_64` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1` and `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `InterruptShadowStackTable` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-payload/src/arch/x86_64/cet.rs:31:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | struct InterruptShadowStackTable { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-payload` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::ratls` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:20:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | use crate::ratls; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_DEC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:23:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | const TDCS_FIELD_MIG_DEC_KEY: u64 = 0x9810_0003_0000_0010; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_ENC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:24:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | const TDCS_FIELD_MIG_ENC_KEY: u64 = 0x9810_0003_0000_0018; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:25:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | const TDCS_FIELD_MIG_VERSION: u64 = 0x9810_0001_0000_0020; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:27:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | const GSM_FIELD_MIN_EXPORT_VERSION: u64 = 0x2000000100000001; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:28:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | const GSM_FIELD_MAX_EXPORT_VERSION: u64 = 0x2000000100000002; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:29:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 | const GSM_FIELD_MIN_IMPORT_VERSION: u64 = 0x2000000100000003; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:30:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 30 | const GSM_FIELD_MAX_IMPORT_VERSION: u64 = 0x2000000100000004; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: struct `ExchangeInformation` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:50:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 50 | struct ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: methods `as_bytes` and `as_bytes_mut` are never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:67:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 66 | impl ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  | ------------------------ methods in this implementation Step #3 - "compile-libfuzzer-address-x86_64": 67 |  fn as_bytes(&self) -> &[u8] { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 71 |  fn as_bytes_mut(&mut self) -> &mut [u8] { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `Complete` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:79:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 76 | enum MigrationState { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 79 |  Complete(RequestInformation), Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `cal_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:488:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 488 | fn cal_mig_version( Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `set_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:520:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 520 | fn set_mig_version(info: &MigrationInformation, mig_ver: u16) -> Result<()> { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd` (lib) generated 13 warnings (run `cargo fix --lib -p migtd` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 4 warnings (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd-fuzz v0.0.0 (/src/MigTD/src/migtd/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `NoCertificatesPresented` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub enum MigrationError { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 14 |  NoCertificatesPresented, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `MigrationError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/service_response.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "afl_service_response") generated 3 warnings (1 duplicate) Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "service_response") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 38.34s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_service_response Step #3 - "compile-libfuzzer-address-x86_64": service_response' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=service_response Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=migtd Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/service_response /workspace/out/libfuzzer-address-x86_64/migtd-service_response Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/policy =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/policy' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 105 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (latest: v1.4.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding generic-array v0.14.7 (latest: v1.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding hashbrown v0.14.5 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding linux-raw-sys v0.4.14 (latest: v0.6.5) Step #3 - "compile-libfuzzer-address-x86_64":  Adding r-efi v3.2.0 (latest: v5.1.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding rustls v0.23.12 (latest: v0.23.17) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll v0.10.2 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding scroll_derive v0.10.5 (latest: v0.12.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (latest: v1.0.215) Step #3 - "compile-libfuzzer-address-x86_64":  Adding spin v0.5.2 (latest: v0.9.8) Step #3 - "compile-libfuzzer-address-x86_64":  Adding syn v1.0.109 (latest: v2.0.87) Step #3 - "compile-libfuzzer-address-x86_64":  Adding volatile v0.4.6 (latest: v0.6.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding wasi v0.11.0+wasi-snapshot-preview1 (latest: v0.13.3+wasi-0.2.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding which v5.0.0 (latest: v7.0.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.48.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-sys v0.52.0 (latest: v0.59.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows-targets v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_aarch64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_i686_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnu v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_gnullvm v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding windows_x86_64_msvc v0.48.5 (latest: v0.52.6) Step #3 - "compile-libfuzzer-address-x86_64":  Adding x86_64 v0.14.12 (latest: v0.15.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Adding zerocopy-derive v0.7.35 (latest: v0.8.10) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.164 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.6.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.22 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.41 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.13.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling allocator-api2 v0.2.20 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.23.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.133 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.6.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.8.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.37 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.87 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:44:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 | #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `target` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/build.rs:155:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 155 |  #[cfg(target = "x86_64-unknown-none")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(target, values("x86_64-unknown-none"))'] } Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (build script) generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `fuzz` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/td-shim/src/lib.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | #[cfg(feature = "fuzz")] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `feature` are: `default`, `der`, `lazy-accept`, `linked_list_allocator`, `log`, `main`, `ring`, `ring-hash`, `secure-boot`, `sha2-hash`, `spin`, `td-exception`, `td-loader`, `td-logger`, `td-paging`, `tdx`, `tdx-tdcall`, `x86`, and `x86_64` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider adding `fuzz` as a feature in `Cargo.toml` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `td-shim` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1` and `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: associated constant `ZERO` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/endian.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | -------- associated constant in this trait Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 11 |  const ZERO: Self; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 4 warnings (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-migtd-policy-fuzz v0.0.0 (/src/MigTD/src/policy/fuzz) Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 42.25s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_policy Step #3 - "compile-libfuzzer-address-x86_64": policy' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/policy /workspace/out/libfuzzer-address-x86_64/policy-policy Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 51df0d6876cd: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 38da3118a46e: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 76485c50adab: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6e454ec0415e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fcc56198b7b3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 839d42049c75: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 9b7f47b799be: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 885b716fb19d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1f82e1e2eaac: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3582fe5817de: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a221f9a44ef5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e9f45d43ad23: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": db56863ee7be: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 84816e0f3769: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a6399624745a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0715e4009fac: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4e5763569d03: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7f4c947f7af3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 30d1cf1bf2b4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e9f45d43ad23: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9b7f47b799be: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 885b716fb19d: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": db56863ee7be: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7f4c947f7af3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0715e4009fac: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 84816e0f3769: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 30d1cf1bf2b4: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a6399624745a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4e5763569d03: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3582fe5817de: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a221f9a44ef5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 839d42049c75: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fcc56198b7b3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 76485c50adab: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 76485c50adab: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6e454ec0415e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6e454ec0415e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 76485c50adab: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9b7f47b799be: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 9b7f47b799be: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 885b716fb19d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 885b716fb19d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f82e1e2eaac: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1f82e1e2eaac: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6e454ec0415e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a221f9a44ef5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3582fe5817de: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3582fe5817de: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fcc56198b7b3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": db56863ee7be: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": db56863ee7be: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 839d42049c75: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 839d42049c75: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 84816e0f3769: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 84816e0f3769: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a6399624745a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a6399624745a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0715e4009fac: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0715e4009fac: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e5763569d03: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4e5763569d03: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7f4c947f7af3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 30d1cf1bf2b4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 30d1cf1bf2b4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e9f45d43ad23: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e9f45d43ad23: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 839d42049c75: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9b7f47b799be: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 885b716fb19d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f82e1e2eaac: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3582fe5817de: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a221f9a44ef5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e9f45d43ad23: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": db56863ee7be: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 84816e0f3769: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a6399624745a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0715e4009fac: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e5763569d03: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7f4c947f7af3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 30d1cf1bf2b4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:cb894d78b81942499e77d79f91f562ce74c084f3ca1001f2c72a30e5404d1f69 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprx28525y/migtd-service_response Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprx28525y/crypto-x509 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprx28525y/policy-policy Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/migtd Step #6: adding: crypto-x509 (deflated 73%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: migtd-service_response (deflated 74%) Step #6: adding: policy-policy (deflated 74%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 148 0 0 100 148 0 735 --:--:-- --:--:-- --:--:-- 736 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 37 44.4M 0 0 37 16.5M 0 104M --:--:-- --:--:-- --:--:-- 103M 100 44.4M 0 0 100 44.4M 0 70.3M --:--:-- --:--:-- --:--:-- 70.3M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 49 0 0 100 49 0 151 --:--:-- --:--:-- --:--:-- 151 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 30 0 0 100 30 0 112 --:--:-- --:--:-- --:--:-- 113 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/migtd Finished Step #11 PUSH DONE