starting build "cef90791-4b41-48ba-8e20-4e3bd209e995" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f" Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Sending build context to Docker daemon 5.632kB Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": latest: Pulling from oss-fuzz-base/base-builder-rust Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b549f31133a9: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": cad0867f0297: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 5d07bc49990e: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 21aae50984bf: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2b5f5f715028: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": fb6a199bc10f: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1c207e5b0063: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": caf57254f43a: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1462b1d00e14: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 540ea4dfdceb: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 8fdd4b5faaa9: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 40d7bc1ff8c7: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": d2eb4100ded1: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 156a283b0470: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e9658ec5255e: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 21aae50984bf: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c4e6646538bb: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6939a674b517: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 003b03fbacbd: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 58292fae4de9: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2b5f5f715028: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b06c7963df6e: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": fb6a199bc10f: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b6ae7f0c1d24: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 551029df1c46: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2f5903485cae: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 60671fdd34b1: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c1a14989bf3a: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 10a7a3f93f2d: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 22ef1e73dafd: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c9621467b9f7: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6e67e1dc3fc0: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b9c4ff0b77c8: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 155c2dfe5c67: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b5f1ebb46627: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e959da9f743c: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c66a5b9ffa39: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 0f4fc2b4c404: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 780b129705e7: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": a9144c235512: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e16fcfe620a9: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 64f5883495aa: Pulling fs layer Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1462b1d00e14: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e9658ec5255e: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 58292fae4de9: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": caf57254f43a: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c4e6646538bb: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b06c7963df6e: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 60671fdd34b1: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b6ae7f0c1d24: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 551029df1c46: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2f5903485cae: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": a9144c235512: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 540ea4dfdceb: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 780b129705e7: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 10a7a3f93f2d: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e959da9f743c: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 64f5883495aa: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c9621467b9f7: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c66a5b9ffa39: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 40d7bc1ff8c7: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 155c2dfe5c67: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 156a283b0470: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c1a14989bf3a: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 8fdd4b5faaa9: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 003b03fbacbd: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": d2eb4100ded1: Waiting Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 5d07bc49990e: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 5d07bc49990e: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b549f31133a9: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b549f31133a9: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2b5f5f715028: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2b5f5f715028: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 21aae50984bf: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 21aae50984bf: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1c207e5b0063: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1c207e5b0063: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": caf57254f43a: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": caf57254f43a: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": cad0867f0297: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": cad0867f0297: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b549f31133a9: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 540ea4dfdceb: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 8fdd4b5faaa9: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 40d7bc1ff8c7: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 40d7bc1ff8c7: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": d2eb4100ded1: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": d2eb4100ded1: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 156a283b0470: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 156a283b0470: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e9658ec5255e: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e9658ec5255e: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1462b1d00e14: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1462b1d00e14: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c4e6646538bb: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6939a674b517: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6939a674b517: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 003b03fbacbd: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 003b03fbacbd: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 58292fae4de9: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 58292fae4de9: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b06c7963df6e: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b06c7963df6e: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b6ae7f0c1d24: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b6ae7f0c1d24: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 551029df1c46: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2f5903485cae: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2f5903485cae: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 60671fdd34b1: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c1a14989bf3a: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c1a14989bf3a: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 10a7a3f93f2d: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 10a7a3f93f2d: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 22ef1e73dafd: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c9621467b9f7: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c9621467b9f7: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6e67e1dc3fc0: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6e67e1dc3fc0: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b9c4ff0b77c8: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b9c4ff0b77c8: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 155c2dfe5c67: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 155c2dfe5c67: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b5f1ebb46627: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c66a5b9ffa39: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c66a5b9ffa39: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e959da9f743c: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": cad0867f0297: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 0f4fc2b4c404: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 0f4fc2b4c404: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 780b129705e7: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 780b129705e7: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 5d07bc49990e: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": a9144c235512: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": a9144c235512: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": fb6a199bc10f: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": fb6a199bc10f: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e16fcfe620a9: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e16fcfe620a9: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 21aae50984bf: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2b5f5f715028: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 64f5883495aa: Verifying Checksum Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 64f5883495aa: Download complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": fb6a199bc10f: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1c207e5b0063: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": caf57254f43a: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 1462b1d00e14: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 540ea4dfdceb: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 8fdd4b5faaa9: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 40d7bc1ff8c7: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": d2eb4100ded1: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 156a283b0470: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e9658ec5255e: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c4e6646538bb: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6939a674b517: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 003b03fbacbd: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 58292fae4de9: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b06c7963df6e: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b6ae7f0c1d24: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 551029df1c46: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 2f5903485cae: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 60671fdd34b1: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c1a14989bf3a: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 10a7a3f93f2d: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 22ef1e73dafd: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c9621467b9f7: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 6e67e1dc3fc0: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b9c4ff0b77c8: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 155c2dfe5c67: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": b5f1ebb46627: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e959da9f743c: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": c66a5b9ffa39: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 0f4fc2b4c404: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 780b129705e7: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": a9144c235512: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": e16fcfe620a9: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 64f5883495aa: Pull complete Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Digest: sha256:2e738d81e22ee629c40a692384a93a334d99f5c793c5c3145c938c64ad41d637 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> 220f95866a95 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Step 2/5 : RUN apt-get update && apt-get install -y nasm Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> Running in 50eaaaae00fd Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Hit:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Reading package lists... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Reading package lists... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Building dependency tree... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Reading state information... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": The following packages were automatically installed and are no longer required: Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": autotools-dev libsigsegv2 m4 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Use 'apt autoremove' to remove them. Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": The following NEW packages will be installed: Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": nasm Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Need to get 362 kB of archives. Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": After this operation, 3374 kB of additional disk space will be used. Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB] Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Fetched 362 kB in 1s (468 kB/s) Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Selecting previously unselected package nasm. Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Preparing to unpack .../nasm_2.14.02-1_amd64.deb ... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Unpacking nasm (2.14.02-1) ... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Setting up nasm (2.14.02-1) ... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Removing intermediate container 50eaaaae00fd Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> e8e8fbcfec2e Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Step 3/5 : RUN git clone --depth 1 https://github.com/intel/vtpm-td.git Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> Running in e75c2de5b0eb Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Cloning into 'vtpm-td'... Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Removing intermediate container e75c2de5b0eb Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> 8d0982aeb421 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Step 4/5 : COPY build.sh $SRC/ Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> c3581d4dec9f Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Step 5/5 : WORKDIR $SRC/vtpm-td Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> Running in 6a0c66cf7328 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Removing intermediate container 6a0c66cf7328 Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": ---> fc5370932faf Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Successfully built fc5370932faf Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Successfully tagged gcr.io/oss-fuzz/vtpm-td:latest Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/vtpm-td:latest Finished Step #1 - "build-ff1336dd-53d6-4957-9f7e-467cec0e119f" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/vtpm-td Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileh6PXQL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/vtpm-td/.git Step #2 - "srcmap": + GIT_DIR=/src/vtpm-td Step #2 - "srcmap": + cd /src/vtpm-td Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/intel/vtpm-td.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=79ef9a3d3eb6a4956611186d3df57844cc0ac67b Step #2 - "srcmap": + jq_inplace /tmp/fileh6PXQL '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "79ef9a3d3eb6a4956611186d3df57844cc0ac67b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileQc8Llb Step #2 - "srcmap": + cat /tmp/fileh6PXQL Step #2 - "srcmap": + jq '."/src/vtpm-td" = { type: "git", url: "https://github.com/intel/vtpm-td.git", rev: "79ef9a3d3eb6a4956611186d3df57844cc0ac67b" }' Step #2 - "srcmap": + mv /tmp/fileQc8Llb /tmp/fileh6PXQL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileh6PXQL Step #2 - "srcmap": + rm /tmp/fileh6PXQL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/vtpm-td": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/intel/vtpm-td.git", Step #2 - "srcmap": "rev": "79ef9a3d3eb6a4956611186d3df57844cc0ac67b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": +++ readlink -f '{}' Step #3 - "compile-libfuzzer-address-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/vtpm-td/{}' ';' Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_CRATE_DIRS=/src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + git submodule update --init --recursive Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/ms-tpm-20-ref' (https://github.com/microsoft/ms-tpm-20-ref.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/openssl' (https://github.com/openssl/openssl.git) registered for path 'deps/rust-tpm-20-ref/openssl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rust-tpm-20-ref/smallc/musl' (https://git.musl-libc.org/git/musl) registered for path 'deps/rust-tpm-20-ref/smallc/musl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/spdm-rs' (https://github.com/ccc-spdm-tools/spdm-rs.git) registered for path 'deps/spdm-rs' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/smallc/musl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/td-shim'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx': checked out '0939077616b16d10f82652dd1361a5d4ed8b2e56' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dcap_source'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/dnnl/dnnl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/ippcp_internal/ipp-crypto'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/openmp/openmp_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/sgx-emm/emm_src'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out 'a4e3c1da8095d363ada0f5b7bec7850563e8139d' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out 'd9d13aaaf8889753fb58a13c2652c39b67c2076b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '222b9d8cd246809cc8da041241824b0d0469000f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref': checked out 'd638536d0fe01acd5e39ffa1bd100b3da82d92c7' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/wolfssl' (https://github.com/wolfSSL/wolfssl.git) registered for path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/ms-tpm-20-ref/external/wolfssl': checked out '9c87f979a7f1d3a6d786b260653d566c1d31a1c4' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl': checked out '2cf4e90eaaf7402bf038b158dbdacd0a15561fb7' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'gost-engine' (https://github.com/gost-engine/engine) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'krb5' (https://github.com/krb5/krb5) registered for path 'deps/rust-tpm-20-ref/openssl/krb5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'oqs-provider' (https://github.com/open-quantum-safe/oqs-provider.git) registered for path 'deps/rust-tpm-20-ref/openssl/oqs-provider' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'pyca.cryptography' (https://github.com/pyca/cryptography.git) registered for path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'python-ecdsa' (https://github.com/tlsfuzzer/python-ecdsa) registered for path 'deps/rust-tpm-20-ref/openssl/python-ecdsa' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'tlsfuzzer' (https://github.com/tlsfuzzer/tlsfuzzer) registered for path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'tlslite-ng' (https://github.com/tlsfuzzer/tlslite-ng) registered for path 'deps/rust-tpm-20-ref/openssl/tlslite-ng' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'wycheproof' (https://github.com/google/wycheproof) registered for path 'deps/rust-tpm-20-ref/openssl/wycheproof' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/krb5'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/oqs-provider'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/pyca-cryptography'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/python-ecdsa'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlsfuzzer'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/tlslite-ng'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/wycheproof'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine': checked out 'b2b4d629f100eaee9f5942a106b1ccefe85b8808' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'libprov' (https://github.com/provider-corner/libprov.git) registered for path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/rust-tpm-20-ref/openssl/gost-engine/libprov'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/gost-engine/libprov': checked out '8a126e09547630ef900177625626b6156052f0ee' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/krb5': checked out 'aa9b4a2a64046afd2fab7cb49c346295874a5fb6' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/oqs-provider': checked out '3f3d8a8cf331c73a26fe93a598273997cb54eb4f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/pyca-cryptography': checked out 'c18d0567386414efa3caef7ed586c4ca75bf3a8b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/python-ecdsa': checked out '4de8d5bf89089d1140eb99aa5d7eb2dc8e6337b6' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlsfuzzer': checked out 'dbd56c149072e656ca8d6a43a59588f3e7513da2' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/tlslite-ng': checked out '771e9f59d639dbb0e2fa8e646c8e588405d3903e' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/openssl/wycheproof': checked out '2196000605e45d91097147c9c71f26b72af58003' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rust-tpm-20-ref/smallc/musl': checked out 'f5f55d6589940fd2c2188d76686efe3a530e64e0' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs': checked out 'f42eaf4680da0b0684ec1b9d64b7e417f8ff8160' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/spdm-rs/external/ring' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/webpki' (https://github.com/briansmith/webpki.git) registered for path 'deps/spdm-rs/external/webpki' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/spdm-rs/external/webpki'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs/external/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/spdm-rs/external/webpki': checked out 'f84a538a5cd281ba1ffc0d54bbe5824cf5969703' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim': checked out '5f46c59f341f6b8df976ce6409ab81a0da39bcf1' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/vtpm-td/deps/td-shim/library/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": + bash sh_script/pre-build.sh Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim/library/ring /src/vtpm-td/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": patching file Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file build.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs/external/ring /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs/external/webpki /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at f84a538 0.22.4. Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/spdm-rs Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref/ms-tpm-20-ref /src/vtpm-td/deps/rust-tpm-20-ref Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at d638536 Merge pull request #64 from jhand2/compiler_warnings Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/src/support/Manufacture.c Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/configure.ac Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/include/Ossl/TpmToOsslMath.h Step #3 - "compile-libfuzzer-address-x86_64": patching file TPMCmd/tpm/include/BaseTypes.h Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td/deps/rust-tpm-20-ref Step #3 - "compile-libfuzzer-address-x86_64": /src/vtpm-td Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/vtpm-td/./src/crypto =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/vtpm-td/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 101 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding arbitrary v1.1.3 (available: v1.4.2) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde v1.0.198 (available: v1.0.228) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_derive v1.0.198 (available: v1.0.228) Step #3 - "compile-libfuzzer-address-x86_64":  Adding serde_json v1.0.143 (available: v1.0.145) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.10.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bytes v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded async-trait v0.1.89 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize_derive v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded memchr v2.7.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_json v1.0.143 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der v0.7.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ryu v1.0.20 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.106 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.101 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.28 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded getrandom v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-channel v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded find-msvc-tools v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.39 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize v1.8.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.41 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded maybe-async v0.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.34 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-sink v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustversion v1.0.22 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lock_api v0.4.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded itoa v1.0.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.176 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.101 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.41 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.176 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling find-msvc-tools v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.143 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-sink v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.20 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.22 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.28 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling codec v0.2.2 (/src/vtpm-td/deps/spdm-rs/codec) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.9.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bytes v1.10.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-channel v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/codec/src/codec.rs:20:24 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 |  pub fn init(bytes: &[u8]) -> Reader { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 |  pub fn init(bytes: &[u8]) -> Reader<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/codec/src/codec.rs:55:16 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 55 |  pub fn sub(&mut self, len: usize) -> Option { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^ ^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 55 |  pub fn sub(&mut self, len: usize) -> Option> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/codec/src/codec.rs:73:24 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 73 |  pub fn init(bytes: &mut [u8]) -> Writer { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^ ^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 73 |  pub fn init(bytes: &mut [u8]) -> Writer<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.13 Step #3 - "compile-libfuzzer-address-x86_64": warning: `codec` (lib) generated 3 warnings (run `cargo fix --lib -p codec` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.106 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.39 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/vtpm-td/deps/spdm-rs/external/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/vtpm-td/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.198 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize_derive v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.7.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling maybe-async v0.2.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling async-trait v0.1.89 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.8.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling global v0.1.0 (/src/vtpm-td/src/global) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.35 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.7.10 Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `pregenerate_asm_only` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/lib.rs:47:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 47 | #![cfg(not(pregenerate_asm_only))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `docsrs`, `feature`, and `test` and 31 more Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(pregenerate_asm_only)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(pregenerate_asm_only)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition value: `aarc64` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/prefixed.rs:45:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 45 |  target_arch = "aarc64", Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^-------- Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | help: there is a expected value with a similar name: `"aarch64"` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: expected values for `target_arch` are: `aarch64`, `amdgpu`, `arm`, `arm64ec`, `avr`, `bpf`, `csky`, `hexagon`, `loongarch32`, `loongarch64`, `m68k`, `mips`, `mips32r6`, `mips64`, `mips64r6`, `msp430`, `nvptx64`, `powerpc`, `powerpc64`, `riscv32`, `riscv64`, `s390x`, `sparc`, `sparc64`, `wasm32`, `wasm64`, `x86`, `x86_64`, and `xtensa` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1` and `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: trait `Encoding` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/endian.rs:7:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | pub trait Encoding: From + Into Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/arithmetic/bigint/modulus.rs:161:20 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 161 |  pub fn modulus(&self) -> Modulus { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 161 |  pub fn modulus(&self) -> Modulus<'_, M> { Step #3 - "compile-libfuzzer-address-x86_64":  | +++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/pkcs8.rs:56:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 56 |  fn alg_id_value(&self) -> untrusted::Input { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 56 |  fn alg_id_value(&self) -> untrusted::Input<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/pkcs8.rs:65:22 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 65 |  pub fn curve_oid(&self) -> untrusted::Input { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 65 |  pub fn curve_oid(&self) -> untrusted::Input<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/ring/src/rsa/public_modulus.rs:72:25 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 72 |  pub(super) fn value(&self) -> bigint::Modulus { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 72 |  pub(super) fn value(&self) -> bigint::Modulus<'_, N> { Step #3 - "compile-libfuzzer-address-x86_64":  | +++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling webpki v0.22.4 (/src/vtpm-td/deps/spdm-rs/external/webpki) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `CONSTRUCTED` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/webpki/src/der.rs:17:24 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 |  der::{nested, Tag, CONSTRUCTED}, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/webpki/src/end_entity.rs:78:25 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 78 |  pub(super) fn inner(&self) -> &cert::Cert { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | || Step #3 - "compile-libfuzzer-address-x86_64":  | | |the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | the same lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 78 |  pub(super) fn inner(&self) -> &cert::Cert<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/external/webpki/src/name/dns_name.rs:44:19 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  pub fn as_ref(&self) -> DnsNameRef { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  pub fn as_ref(&self) -> DnsNameRef<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `webpki` (lib) generated 3 warnings (run `cargo fix --lib -p webpki` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spdmlib v0.1.0 (/src/vtpm-td/deps/spdm-rs/spdmlib) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `alloc::boxed::Box` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/spdmlib/src/common/mod.rs:14:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | use alloc::boxed::Box; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: the feature `async_fn_in_trait` has been stable since 1.75.0 and no longer requires an attribute to enable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/deps/spdm-rs/spdmlib/src/lib.rs:9:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | #![feature(async_fn_in_trait)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(stable_features)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 8 warnings (run `cargo fix --lib -p ring` to apply 5 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/vtpm-td/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/vtpm-td/src/crypto/src/x509.rs:164:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 164 |  pub fn tbs_certificate(&self) -> &TBSCertificate { Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | | || Step #3 - "compile-libfuzzer-address-x86_64":  | | |the same lifetime is hidden here Step #3 - "compile-libfuzzer-address-x86_64":  | | the same lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 164 |  pub fn tbs_certificate(&self) -> &TBSCertificate<'_> { Step #3 - "compile-libfuzzer-address-x86_64":  | ++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto` (lib) generated 1 warning (run `cargo fix --lib -p crypto` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64": warning: `spdmlib` (lib) generated 2 warnings (run `cargo fix --lib -p spdmlib` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling certchain-fuzz v0.0.0 (/src/vtpm-td/src/crypto/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `get_cert_from_certchain` and `parse_extensions` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_certchain.rs:1:23 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 1 | use crypto::resolve::{get_cert_from_certchain, parse_extensions}; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crypto::x509::Certificate` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_certchain.rs:2:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 2 | use crypto::x509::Certificate; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `der::Decode` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_certchain.rs:3:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 3 | use der::Decode; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `td_report` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/certchain.rs:21:25 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  let td_report = parse_extensions(&extensions.unwrap()); Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_td_report` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` (part of `#[warn(unused)]`) on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `certchain-fuzz` (bin "afl_certchain") generated 3 warnings (run `cargo fix --bin "afl_certchain"` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64": warning: `certchain-fuzz` (bin "certchain") generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 29.57s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_certchain Step #3 - "compile-libfuzzer-address-x86_64": certchain' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_certchain =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ certchain =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=certchain Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/vtpm-td/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=crypto Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/certchain /workspace/out/libfuzzer-address-x86_64/crypto-certchain Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": cad0867f0297: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 5d07bc49990e: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 44cb0126eb9f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a56ff748a9a8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a2fb0ed9e009: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f1c66ff839e8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6407c60781cb: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2aedbca4b0c5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5eb917c1be4c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b14d900f9083: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 147a0260c0e7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 45ecb17becc3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4b12f89cab71: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0264e9dc4f17: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 604b903d86bc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 74ceb0df6853: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c464a0b74cc6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 32bac08d0f41: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 313c0e14775f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 54b5966c5152: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e4d1c52c51e5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6c2a7aea9205: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 96c0e9d3caa1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fe059bb13cd6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bd1214b0ceb5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6407c60781cb: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c464a0b74cc6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2aedbca4b0c5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 32bac08d0f41: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5eb917c1be4c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 313c0e14775f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b14d900f9083: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 54b5966c5152: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e4d1c52c51e5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 147a0260c0e7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6c2a7aea9205: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 604b903d86bc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f1c66ff839e8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fe059bb13cd6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": bd1214b0ceb5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 45ecb17becc3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4b12f89cab71: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 96c0e9d3caa1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0264e9dc4f17: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a2fb0ed9e009: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a2fb0ed9e009: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 44cb0126eb9f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a56ff748a9a8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a56ff748a9a8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6407c60781cb: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6407c60781cb: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 44cb0126eb9f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f1c66ff839e8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f1c66ff839e8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5eb917c1be4c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5eb917c1be4c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b14d900f9083: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b14d900f9083: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 147a0260c0e7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a56ff748a9a8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a2fb0ed9e009: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4b12f89cab71: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4b12f89cab71: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2aedbca4b0c5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2aedbca4b0c5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0264e9dc4f17: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0264e9dc4f17: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 604b903d86bc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f1c66ff839e8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 45ecb17becc3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6407c60781cb: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c464a0b74cc6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c464a0b74cc6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 313c0e14775f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 313c0e14775f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 54b5966c5152: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 74ceb0df6853: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 74ceb0df6853: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e4d1c52c51e5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e4d1c52c51e5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c2a7aea9205: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6c2a7aea9205: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 96c0e9d3caa1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 96c0e9d3caa1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fe059bb13cd6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fe059bb13cd6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bd1214b0ceb5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bd1214b0ceb5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 32bac08d0f41: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 32bac08d0f41: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2aedbca4b0c5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5eb917c1be4c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b14d900f9083: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 147a0260c0e7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 45ecb17becc3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4b12f89cab71: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0264e9dc4f17: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 604b903d86bc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 74ceb0df6853: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c464a0b74cc6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 32bac08d0f41: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 313c0e14775f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 54b5966c5152: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e4d1c52c51e5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6c2a7aea9205: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 96c0e9d3caa1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fe059bb13cd6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": bd1214b0ceb5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:1460e902b030400f5fbce4acc2bf327c3ba685fdf776441a215e2ee91092082e Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpumjqo9t_/crypto-certchain Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/vtpm-td Step #6: adding: crypto-certchain (deflated 71%) Step #6: adding: llvm-symbolizer (deflated 65%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 7eb39101e508: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 152 0 0 100 152 0 648 --:--:-- --:--:-- --:--:-- 646 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 5332k 0 0 100 5332k 0 19.5M --:--:-- --:--:-- --:--:-- 19.5M 100 5332k 0 0 100 5332k 0 19.5M --:--:-- --:--:-- --:--:-- 19.5M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 17 0 0 100 17 0 59 --:--:-- --:--:-- --:--:-- 60 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 153 --:--:-- --:--:-- --:--:-- 153 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/vtpm-td Finished Step #11 PUSH DONE