starting build "d26a0aeb-73af-4e36-a11b-41770f2c381f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 9e47fb9dd199: Pulling fs layer Step #1: 905e641a4b54: Pulling fs layer Step #1: 8fcaf59102ed: Pulling fs layer Step #1: a9c74f632174: Pulling fs layer Step #1: f013ccbc22d3: Pulling fs layer Step #1: aa7628f757ea: Pulling fs layer Step #1: 49780d3797d7: Pulling fs layer Step #1: 8bb48e7bd5aa: Pulling fs layer Step #1: a60c1afcc4de: Pulling fs layer Step #1: 1bf625c1f2e9: Pulling fs layer Step #1: 0d403ab20828: Pulling fs layer Step #1: 59b333e0d31f: Pulling fs layer Step #1: f9f618c603e5: Pulling fs layer Step #1: 51a11501906f: Pulling fs layer Step #1: 058ec0f2cc9f: Pulling fs layer Step #1: bf5fa999ddb8: Pulling fs layer Step #1: 8fcaf59102ed: Waiting Step #1: 3b79056069ee: Pulling fs layer Step #1: 2af4c62c4868: Pulling fs layer Step #1: a9c74f632174: Waiting Step #1: b7f4aba96676: Pulling fs layer Step #1: aa7628f757ea: Waiting Step #1: b183bf4b4905: Pulling fs layer Step #1: f013ccbc22d3: Waiting Step #1: 684bf5ceae20: Pulling fs layer Step #1: 49780d3797d7: Waiting Step #1: 9f325110a2f2: Pulling fs layer Step #1: 1bf625c1f2e9: Waiting Step #1: 9506c77dd40c: Pulling fs layer Step #1: 8bb48e7bd5aa: Waiting Step #1: 9fe2f424e764: Pulling fs layer Step #1: a60c1afcc4de: Waiting Step #1: 629364863e03: Pulling fs layer Step #1: d2235c9c3e41: Pulling fs layer Step #1: 0d403ab20828: Waiting Step #1: 3ae4a153df7c: Pulling fs layer Step #1: bf5fa999ddb8: Waiting Step #1: 5363e097ce6b: Pulling fs layer Step #1: 59b333e0d31f: Waiting Step #1: edf30144e380: Pulling fs layer Step #1: e37744601bbe: Pulling fs layer Step #1: f9f618c603e5: Waiting Step #1: 3b79056069ee: Waiting Step #1: 2af4c62c4868: Waiting Step #1: 51a11501906f: Waiting Step #1: 058ec0f2cc9f: Waiting Step #1: b7f4aba96676: Waiting Step #1: b183bf4b4905: Waiting Step #1: 684bf5ceae20: Waiting Step #1: edf30144e380: Waiting Step #1: d2235c9c3e41: Waiting Step #1: 3ae4a153df7c: Waiting Step #1: 9f325110a2f2: Waiting Step #1: 9506c77dd40c: Waiting Step #1: 5363e097ce6b: Waiting Step #1: 9fe2f424e764: Waiting Step #1: 629364863e03: Waiting Step #1: 905e641a4b54: Verifying Checksum Step #1: 905e641a4b54: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8fcaf59102ed: Verifying Checksum Step #1: 8fcaf59102ed: Download complete Step #1: a9c74f632174: Verifying Checksum Step #1: a9c74f632174: Download complete Step #1: f013ccbc22d3: Verifying Checksum Step #1: f013ccbc22d3: Download complete Step #1: 49780d3797d7: Verifying Checksum Step #1: 49780d3797d7: Download complete Step #1: 8bb48e7bd5aa: Download complete Step #1: 9e47fb9dd199: Verifying Checksum Step #1: 9e47fb9dd199: Download complete Step #1: 1bf625c1f2e9: Verifying Checksum Step #1: 1bf625c1f2e9: Download complete Step #1: 0d403ab20828: Verifying Checksum Step #1: 0d403ab20828: Download complete Step #1: 59b333e0d31f: Verifying Checksum Step #1: 59b333e0d31f: Download complete Step #1: b549f31133a9: Pull complete Step #1: f9f618c603e5: Verifying Checksum Step #1: f9f618c603e5: Download complete Step #1: 51a11501906f: Download complete Step #1: 058ec0f2cc9f: Verifying Checksum Step #1: 058ec0f2cc9f: Download complete Step #1: bf5fa999ddb8: Verifying Checksum Step #1: bf5fa999ddb8: Download complete Step #1: 3b79056069ee: Verifying Checksum Step #1: 3b79056069ee: Download complete Step #1: 2af4c62c4868: Verifying Checksum Step #1: 2af4c62c4868: Download complete Step #1: a60c1afcc4de: Verifying Checksum Step #1: a60c1afcc4de: Download complete Step #1: b7f4aba96676: Verifying Checksum Step #1: b7f4aba96676: Download complete Step #1: b183bf4b4905: Verifying Checksum Step #1: b183bf4b4905: Download complete Step #1: 9f325110a2f2: Verifying Checksum Step #1: 9f325110a2f2: Download complete Step #1: 684bf5ceae20: Verifying Checksum Step #1: 684bf5ceae20: Download complete Step #1: 9506c77dd40c: Download complete Step #1: 9fe2f424e764: Download complete Step #1: 629364863e03: Verifying Checksum Step #1: 629364863e03: Download complete Step #1: 3ae4a153df7c: Verifying Checksum Step #1: 3ae4a153df7c: Download complete Step #1: d2235c9c3e41: Download complete Step #1: 5363e097ce6b: Verifying Checksum Step #1: 5363e097ce6b: Download complete Step #1: edf30144e380: Download complete Step #1: aa7628f757ea: Verifying Checksum Step #1: aa7628f757ea: Download complete Step #1: 9e47fb9dd199: Pull complete Step #1: 905e641a4b54: Pull complete Step #1: e37744601bbe: Verifying Checksum Step #1: e37744601bbe: Download complete Step #1: 8fcaf59102ed: Pull complete Step #1: a9c74f632174: Pull complete Step #1: f013ccbc22d3: Pull complete Step #1: aa7628f757ea: Pull complete Step #1: 49780d3797d7: Pull complete Step #1: 8bb48e7bd5aa: Pull complete Step #1: a60c1afcc4de: Pull complete Step #1: 1bf625c1f2e9: Pull complete Step #1: 0d403ab20828: Pull complete Step #1: 59b333e0d31f: Pull complete Step #1: f9f618c603e5: Pull complete Step #1: 51a11501906f: Pull complete Step #1: 058ec0f2cc9f: Pull complete Step #1: bf5fa999ddb8: Pull complete Step #1: 3b79056069ee: Pull complete Step #1: 2af4c62c4868: Pull complete Step #1: b7f4aba96676: Pull complete Step #1: b183bf4b4905: Pull complete Step #1: 684bf5ceae20: Pull complete Step #1: 9f325110a2f2: Pull complete Step #1: 9506c77dd40c: Pull complete Step #1: 9fe2f424e764: Pull complete Step #1: 629364863e03: Pull complete Step #1: d2235c9c3e41: Pull complete Step #1: 3ae4a153df7c: Pull complete Step #1: 5363e097ce6b: Pull complete Step #1: edf30144e380: Pull complete Step #1: e37744601bbe: Pull complete Step #1: Digest: sha256:c9776e12558b37109284fbcb86db4f6dc38d77ad590b64d64675b9a0edeb4b9e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 4677e5560220 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y nasm llvm clang Step #1: ---> Running in a67dcafa4b72 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [930 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4147 kB] Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1207 kB] Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [3672 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1503 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1213 kB] Step #1: Get:11 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [813 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [975 kB] Step #1: Get:13 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 Packages [3616 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/restricted amd64 Packages [3766 kB] Step #1: Fetched 22.1 MB in 3s (8037 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: binfmt-support clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: Suggested packages: Step #1: clang-10-doc ncurses-doc libomp-10-doc llvm-10-doc python3-doc python3-tk Step #1: python3-venv python3-setuptools python-pygments-doc ttf-bitstream-vera Step #1: python3.8-venv python3.8-doc Step #1: The following NEW packages will be installed: Step #1: binfmt-support clang clang-10 file libclang-common-10-dev libclang-cpp10 Step #1: libclang1-10 libffi-dev libgc1c2 libllvm10 libmagic-mgc libmagic1 libmpdec2 Step #1: libncurses-dev libobjc-9-dev libobjc4 libomp-10-dev libomp5-10 libpfm4 Step #1: libpipeline1 libpython3-stdlib libpython3.8-minimal libpython3.8-stdlib Step #1: libtinfo-dev libyaml-0-2 libz3-4 libz3-dev llvm llvm-10 llvm-10-dev Step #1: llvm-10-runtime llvm-10-tools llvm-runtime mime-support nasm python3 Step #1: python3-minimal python3-pkg-resources python3-pygments python3-yaml Step #1: python3.8 python3.8-minimal Step #1: 0 upgraded, 42 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 84.4 MB of archives. Step #1: After this operation, 505 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [718 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8-minimal amd64 3.8.10-0ubuntu1~20.04.9 [1890 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 python3-minimal amd64 3.8.2-0ubuntu2 [23.6 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 mime-support all 3.64ubuntu1 [30.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 libmpdec2 amd64 2.4.2-3 [81.1 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libpython3.8-stdlib amd64 3.8.10-0ubuntu1~20.04.9 [1674 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3.8 amd64 3.8.10-0ubuntu1~20.04.9 [387 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libpython3-stdlib amd64 3.8.2-0ubuntu2 [7068 B] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 python3 amd64 3.8.2-0ubuntu2 [47.6 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal/main amd64 libyaml-0-2 amd64 0.2.2-1 [48.9 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pkg-resources all 45.2.0-1ubuntu0.1 [130 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-yaml amd64 5.3.1-1ubuntu0.1 [136 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal/main amd64 libpipeline1 amd64 1.5.2-2build1 [27.7 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal/universe amd64 binfmt-support amd64 2.2.0-2 [58.2 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal/main amd64 libllvm10 amd64 1:10.0.0-4ubuntu1 [15.3 MB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-cpp10 amd64 1:10.0.0-4ubuntu1 [9944 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal/main amd64 libgc1c2 amd64 1:7.6.4-0.4ubuntu1 [83.9 kB] Step #1: Get:21 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc4 amd64 10.5.0-1ubuntu1~20.04 [42.8 kB] Step #1: Get:22 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 libobjc-9-dev amd64 9.4.0-1ubuntu1~20.04.2 [225 kB] Step #1: Get:23 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang-common-10-dev amd64 1:10.0.0-4ubuntu1 [5012 kB] Step #1: Get:24 http://archive.ubuntu.com/ubuntu focal/universe amd64 libclang1-10 amd64 1:10.0.0-4ubuntu1 [7571 kB] Step #1: Get:25 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang-10 amd64 1:10.0.0-4ubuntu1 [66.9 kB] Step #1: Get:26 http://archive.ubuntu.com/ubuntu focal/universe amd64 clang amd64 1:10.0-50~exp1 [3276 B] Step #1: Get:27 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libncurses-dev amd64 6.2-0ubuntu2.1 [340 kB] Step #1: Get:28 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp5-10 amd64 1:10.0.0-4ubuntu1 [300 kB] Step #1: Get:29 http://archive.ubuntu.com/ubuntu focal/universe amd64 libomp-10-dev amd64 1:10.0.0-4ubuntu1 [47.7 kB] Step #1: Get:30 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libtinfo-dev amd64 6.2-0ubuntu2.1 [972 B] Step #1: Get:31 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-runtime amd64 1:10.0.0-4ubuntu1 [180 kB] Step #1: Get:32 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-runtime amd64 1:10.0-50~exp1 [2916 B] Step #1: Get:33 http://archive.ubuntu.com/ubuntu focal/main amd64 libpfm4 amd64 4.10.1+git20-g7700f49-2 [266 kB] Step #1: Get:34 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10 amd64 1:10.0.0-4ubuntu1 [5214 kB] Step #1: Get:35 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm amd64 1:10.0-50~exp1 [3880 B] Step #1: Get:36 http://archive.ubuntu.com/ubuntu focal/main amd64 libffi-dev amd64 3.3-4 [57.0 kB] Step #1: Get:37 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 python3-pygments all 2.3.1+dfsg-1ubuntu2.2 [579 kB] Step #1: Get:38 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-tools amd64 1:10.0.0-4ubuntu1 [317 kB] Step #1: Get:39 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-4 amd64 4.8.7-4build1 [6792 kB] Step #1: Get:40 http://archive.ubuntu.com/ubuntu focal/universe amd64 libz3-dev amd64 4.8.7-4build1 [67.5 kB] Step #1: Get:41 http://archive.ubuntu.com/ubuntu focal/universe amd64 llvm-10-dev amd64 1:10.0.0-4ubuntu1 [26.0 MB] Step #1: Get:42 http://archive.ubuntu.com/ubuntu focal/universe amd64 nasm amd64 2.14.02-1 [362 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 84.4 MB in 8s (11.0 MB/s) Step #1: Selecting previously unselected package libpython3.8-minimal:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../libpython3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3.8-minimal. Step #1: Preparing to unpack .../python3.8-minimal_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up libpython3.8-minimal:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up python3.8-minimal (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3-minimal. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17667 files and directories currently installed.) Step #1: Preparing to unpack .../0-python3-minimal_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package mime-support. Step #1: Preparing to unpack .../1-mime-support_3.64ubuntu1_all.deb ... Step #1: Unpacking mime-support (3.64ubuntu1) ... Step #1: Selecting previously unselected package libmpdec2:amd64. Step #1: Preparing to unpack .../2-libmpdec2_2.4.2-3_amd64.deb ... Step #1: Unpacking libmpdec2:amd64 (2.4.2-3) ... Step #1: Selecting previously unselected package libpython3.8-stdlib:amd64. Step #1: Preparing to unpack .../3-libpython3.8-stdlib_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package python3.8. Step #1: Preparing to unpack .../4-python3.8_3.8.10-0ubuntu1~20.04.9_amd64.deb ... Step #1: Unpacking python3.8 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Selecting previously unselected package libpython3-stdlib:amd64. Step #1: Preparing to unpack .../5-libpython3-stdlib_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up python3-minimal (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package python3. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 18069 files and directories currently installed.) Step #1: Preparing to unpack .../00-python3_3.8.2-0ubuntu2_amd64.deb ... Step #1: Unpacking python3 (3.8.2-0ubuntu2) ... Step #1: Selecting previously unselected package libmagic-mgc. Step #1: Preparing to unpack .../01-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../02-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../03-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libyaml-0-2:amd64. Step #1: Preparing to unpack .../04-libyaml-0-2_0.2.2-1_amd64.deb ... Step #1: Unpacking libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Selecting previously unselected package python3-pkg-resources. Step #1: Preparing to unpack .../05-python3-pkg-resources_45.2.0-1ubuntu0.1_all.deb ... Step #1: Unpacking python3-pkg-resources (45.2.0-1ubuntu0.1) ... Step #1: Selecting previously unselected package python3-yaml. Step #1: Preparing to unpack .../06-python3-yaml_5.3.1-1ubuntu0.1_amd64.deb ... Step #1: Unpacking python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Selecting previously unselected package libpipeline1:amd64. Step #1: Preparing to unpack .../07-libpipeline1_1.5.2-2build1_amd64.deb ... Step #1: Unpacking libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Selecting previously unselected package binfmt-support. Step #1: Preparing to unpack .../08-binfmt-support_2.2.0-2_amd64.deb ... Step #1: Unpacking binfmt-support (2.2.0-2) ... Step #1: Selecting previously unselected package libllvm10:amd64. Step #1: Preparing to unpack .../09-libllvm10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang-cpp10. Step #1: Preparing to unpack .../10-libclang-cpp10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libgc1c2:amd64. Step #1: Preparing to unpack .../11-libgc1c2_1%3a7.6.4-0.4ubuntu1_amd64.deb ... Step #1: Unpacking libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Selecting previously unselected package libobjc4:amd64. Step #1: Preparing to unpack .../12-libobjc4_10.5.0-1ubuntu1~20.04_amd64.deb ... Step #1: Unpacking libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Selecting previously unselected package libobjc-9-dev:amd64. Step #1: Preparing to unpack .../13-libobjc-9-dev_9.4.0-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package libclang-common-10-dev. Step #1: Preparing to unpack .../14-libclang-common-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libclang1-10. Step #1: Preparing to unpack .../15-libclang1-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang-10. Step #1: Preparing to unpack .../16-clang-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package clang. Step #1: Preparing to unpack .../17-clang_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking clang (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libncurses-dev:amd64. Step #1: Preparing to unpack .../18-libncurses-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package libomp5-10:amd64. Step #1: Preparing to unpack .../19-libomp5-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libomp-10-dev. Step #1: Preparing to unpack .../20-libomp-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libtinfo-dev:amd64. Step #1: Preparing to unpack .../21-libtinfo-dev_6.2-0ubuntu2.1_amd64.deb ... Step #1: Unpacking libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Selecting previously unselected package llvm-10-runtime. Step #1: Preparing to unpack .../22-llvm-10-runtime_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm-runtime. Step #1: Preparing to unpack .../23-llvm-runtime_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm-runtime (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libpfm4:amd64. Step #1: Preparing to unpack .../24-libpfm4_4.10.1+git20-g7700f49-2_amd64.deb ... Step #1: Unpacking libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Selecting previously unselected package llvm-10. Step #1: Preparing to unpack .../25-llvm-10_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package llvm. Step #1: Preparing to unpack .../26-llvm_1%3a10.0-50~exp1_amd64.deb ... Step #1: Unpacking llvm (1:10.0-50~exp1) ... Step #1: Selecting previously unselected package libffi-dev:amd64. Step #1: Preparing to unpack .../27-libffi-dev_3.3-4_amd64.deb ... Step #1: Unpacking libffi-dev:amd64 (3.3-4) ... Step #1: Selecting previously unselected package python3-pygments. Step #1: Preparing to unpack .../28-python3-pygments_2.3.1+dfsg-1ubuntu2.2_all.deb ... Step #1: Unpacking python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Selecting previously unselected package llvm-10-tools. Step #1: Preparing to unpack .../29-llvm-10-tools_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package libz3-4:amd64. Step #1: Preparing to unpack .../30-libz3-4_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-4:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package libz3-dev:amd64. Step #1: Preparing to unpack .../31-libz3-dev_4.8.7-4build1_amd64.deb ... Step #1: Unpacking libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Selecting previously unselected package llvm-10-dev. Step #1: Preparing to unpack .../32-llvm-10-dev_1%3a10.0.0-4ubuntu1_amd64.deb ... Step #1: Unpacking llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Selecting previously unselected package nasm. Step #1: Preparing to unpack .../33-nasm_2.14.02-1_amd64.deb ... Step #1: Unpacking nasm (2.14.02-1) ... Step #1: Setting up libpipeline1:amd64 (1.5.2-2build1) ... Step #1: Setting up libncurses-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up mime-support (3.64ubuntu1) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libgc1c2:amd64 (1:7.6.4-0.4ubuntu1) ... Step #1: Setting up libyaml-0-2:amd64 (0.2.2-1) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up libobjc4:amd64 (10.5.0-1ubuntu1~20.04) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up libffi-dev:amd64 (3.3-4) ... Step #1: Setting up libllvm10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libz3-4:amd64 (4.8.7-4build1) ... Step #1: Setting up libpfm4:amd64 (4.10.1+git20-g7700f49-2) ... Step #1: Setting up libclang1-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up binfmt-support (2.2.0-2) ... Step #1: invoke-rc.d: could not determine current runlevel Step #1: invoke-rc.d: policy-rc.d denied execution of start. Step #1: Setting up nasm (2.14.02-1) ... Step #1: Setting up libobjc-9-dev:amd64 (9.4.0-1ubuntu1~20.04.2) ... Step #1: Setting up libomp5-10:amd64 (1:10.0.0-4ubuntu1) ... Step #1: Setting up libmpdec2:amd64 (2.4.2-3) ... Step #1: Setting up libpython3.8-stdlib:amd64 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up python3.8 (3.8.10-0ubuntu1~20.04.9) ... Step #1: Setting up libpython3-stdlib:amd64 (3.8.2-0ubuntu2) ... Step #1: Setting up libtinfo-dev:amd64 (6.2-0ubuntu2.1) ... Step #1: Setting up libz3-dev:amd64 (4.8.7-4build1) ... Step #1: Setting up libomp-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up libclang-common-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3 (3.8.2-0ubuntu2) ... Step #1: Setting up libclang-cpp10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-runtime (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pygments (2.3.1+dfsg-1ubuntu2.2) ... Step #1: Setting up llvm-runtime (1:10.0-50~exp1) ... Step #1: Setting up clang-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-pkg-resources (45.2.0-1ubuntu0.1) ... Step #1: Setting up llvm-10 (1:10.0.0-4ubuntu1) ... Step #1: Setting up python3-yaml (5.3.1-1ubuntu0.1) ... Step #1: Setting up clang (1:10.0-50~exp1) ... Step #1: Setting up llvm (1:10.0-50~exp1) ... Step #1: Setting up llvm-10-tools (1:10.0.0-4ubuntu1) ... Step #1: Setting up llvm-10-dev (1:10.0.0-4ubuntu1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.15) ... Step #1: Removing intermediate container a67dcafa4b72 Step #1: ---> b6542f510410 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/intel/MigTD.git Step #1: ---> Running in df94f8c300da Step #1: Cloning into 'MigTD'... Step #1: Removing intermediate container df94f8c300da Step #1: ---> 2d5fa655bf59 Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> fcde072ca622 Step #1: Step 5/5 : WORKDIR $SRC/MigTD Step #1: ---> Running in 75307f78b3e9 Step #1: Removing intermediate container 75307f78b3e9 Step #1: ---> eae6b227b5ad Step #1: Successfully built eae6b227b5ad Step #1: Successfully tagged gcr.io/oss-fuzz/migtd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/migtd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileDSOHzP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/MigTD/.git Step #2 - "srcmap": + GIT_DIR=/src/MigTD Step #2 - "srcmap": + cd /src/MigTD Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/intel/MigTD.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c138487fda1af3317047b7cd7e59430b222a3eca Step #2 - "srcmap": + jq_inplace /tmp/fileDSOHzP '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "c138487fda1af3317047b7cd7e59430b222a3eca" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileHQgJtb Step #2 - "srcmap": + cat /tmp/fileDSOHzP Step #2 - "srcmap": + jq '."/src/MigTD" = { type: "git", url: "https://github.com/intel/MigTD.git", rev: "c138487fda1af3317047b7cd7e59430b222a3eca" }' Step #2 - "srcmap": + mv /tmp/fileHQgJtb /tmp/fileDSOHzP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileDSOHzP Step #2 - "srcmap": + rm /tmp/fileDSOHzP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/MigTD": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/intel/MigTD.git", Step #2 - "srcmap": "rev": "c138487fda1af3317047b7cd7e59430b222a3eca" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": info: syncing channel updates for 'nightly-2023-12-31-x86_64-unknown-linux-gnu' Step #3 - "compile-libfuzzer-address-x86_64": info: latest update on 2023-12-31, rust version 1.77.0-nightly (2a3e63551 2023-12-30) Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'cargo' Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'clippy' Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'rust-docs' Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'rust-std' Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'rustc' Step #3 - "compile-libfuzzer-address-x86_64": info: downloading component 'rustfmt' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'cargo' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'clippy' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'rust-docs' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'rust-std' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'rustc' Step #3 - "compile-libfuzzer-address-x86_64": info: installing component 'rustfmt' Step #3 - "compile-libfuzzer-address-x86_64": + set -eox pipefail Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": +++ readlink -f '{}' Step #3 - "compile-libfuzzer-address-x86_64": ++ find . -type d -name fuzz -exec dirname '/src/MigTD/{}' ';' Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_CRATE_DIRS='/src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": + git submodule update --init --recursive Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/linux-sgx' (https://github.com/intel/linux-sgx.git) registered for path 'deps/linux-sgx' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/rustls' (https://github.com/rustls/rustls.git) registered for path 'deps/rustls' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'deps/td-shim' (https://github.com/confidential-containers/td-shim) registered for path 'deps/td-shim' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/rustls'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx': checked out 'e87b7ab876179442691ae5e58e68c81d4834c667' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/cbor/libcbor' (https://github.com/PJK/libcbor.git) registered for path 'deps/linux-sgx/external/cbor/libcbor' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/dcap_source' (https://github.com/intel/SGXDataCenterAttestationPrimitives.git) registered for path 'deps/linux-sgx/external/dcap_source' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'dnnl' (https://github.com/oneapi-src/oneDNN.git) registered for path 'deps/linux-sgx/external/dnnl/dnnl' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'ipp-crypto' (https://github.com/intel/ipp-crypto.git) registered for path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/mbedtls/mbedtls_code' (https://github.com/Mbed-TLS/mbedtls.git) registered for path 'deps/linux-sgx/external/mbedtls/mbedtls_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'openmp' (https://github.com/llvm-mirror/openmp.git) registered for path 'deps/linux-sgx/external/openmp/openmp_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/protobuf/protobuf_code' (https://github.com/protocolbuffers/protobuf.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/sgx-emm/emm_src' (https://github.com/intel/sgx-emm.git) registered for path 'deps/linux-sgx/external/sgx-emm/emm_src' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dnnl/dnnl'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/ippcp_internal/ipp-crypto'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/mbedtls/mbedtls_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/openmp/openmp_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/sgx-emm/emm_src'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor': checked out 'efa6c0886bae46bdaef9b679f61f4b9d8bc296ae' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'doxygen-theme' (https://github.com/nnen/doxygen-theme.git) registered for path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/cbor/libcbor/doxygen-theme'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/cbor/libcbor/doxygen-theme': checked out '46111c61a9f49b7a9886127e679d4317478fab1c' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source': checked out '8f943ebcfbc3e4345998cf9a43470edeb5e501cb' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QVL' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationLibrary.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'QuoteVerification/QuoteVerificationService' (https://github.com/intel/SGX-TDX-DCAP-QuoteVerificationService.git) registered for path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/jwt-cpp' (https://github.com/Thalhammer/jwt-cpp.git) registered for path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'external/wasm-micro-runtime' (https://github.com/bytecodealliance/wasm-micro-runtime.git) registered for path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QVL'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/jwt-cpp'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QVL': checked out '16b7291a7a86e486fdfcf1dfb4be885c0cc00b4e' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/QuoteVerification/QuoteVerificationService': checked out 'abebcaf098d40fe0aa405384ad841862da0cbc4b' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/jwt-cpp': checked out '4a537e969891dde542ad8b1a4a214955a83be29f' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dcap_source/external/wasm-micro-runtime': checked out '75936680662ddc31af6763daa55a622422f9e2f5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/dnnl/dnnl': checked out '52c3052df8ec1d5b8b45cb6c350a952840eabd42' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/ippcp_internal/ipp-crypto': checked out '48d0e528cf948f32a0ed6e734e6e211470e5971a' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/mbedtls/mbedtls_code': checked out '1ec69067fa1351427f904362c1221b31538c8b57' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/openmp/openmp_code': checked out 'c9e7fc8c97382d61565f7ed180e4ea1cc8895b95' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code': checked out '21027a27c4c2ec1000859ccbcfff46d83b16e1ed' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/benchmark' (https://github.com/google/benchmark.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'third_party/googletest' (https://github.com/google/googletest.git) registered for path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark'... Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/benchmark': checked out '5b7683f49e1e9223cf9927b24f6fd3d6bd82e3f8' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/protobuf/protobuf_code/third_party/googletest': checked out '5ec7f0c4a113e2f18ac2c6cc7df51ad6afc24081' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/linux-sgx/external/sgx-emm/emm_src': checked out '893dcbc4e1452f9c20fbe31785a9054acc0cc867' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/rustls': checked out '4d1b762b5328a1714862ba73ec72d5522fe0c049' Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim': checked out '6262a40d898286a383b5a45c4dc7f9fdb1cc56c5' Step #3 - "compile-libfuzzer-address-x86_64": Submodule 'library/ring' (https://github.com/briansmith/ring.git) registered for path 'deps/td-shim/library/ring' Step #3 - "compile-libfuzzer-address-x86_64": Cloning into '/src/MigTD/deps/td-shim/library/ring'... Step #3 - "compile-libfuzzer-address-x86_64": Submodule path 'deps/td-shim/library/ring': checked out '464d367252354418a2c17feb806876d4d89a8508' Step #3 - "compile-libfuzzer-address-x86_64": + bash sh_script/preparation.sh Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim/library/ring /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 464d36725 0.17.6. Step #3 - "compile-libfuzzer-address-x86_64": patching file Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file build.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/td-shim Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD/deps/rustls /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 4d1b762b Bump version to 0.22.0 Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/Cargo.toml Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/client/hs.rs Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/client/tls13.rs Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/error.rs Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/lib.rs Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/server/tls13.rs Step #3 - "compile-libfuzzer-address-x86_64": patching file rustls/src/ticketer.rs Step #3 - "compile-libfuzzer-address-x86_64": /src/MigTD Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/policy =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/policy' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ahash v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded base64 v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-write-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro-error v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded subtle v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zeroize v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy-derive v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded zerocopy v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.65 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_json v1.0.117 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-webpki v0.102.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustix v0.38.34 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde_derive v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded serde v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded version_check v0.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded static_assertions v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-pki-types v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustls-pemfile v2.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro-error-attr v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-util v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-core v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-parse-integer v0.8.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.21 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-write-integer v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded hashbrown v0.11.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded errno v0.3.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded either v1.12.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded der_derive v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded lexical-parse-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded const-oid v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded anyhow v1.0.86 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling static_assertions v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.86 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-util v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.12.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.22.0 (/src/MigTD/deps/rustls/rustls) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.117 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling base64 v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pemfile v2.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error-attr v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-write-integer v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-parse-integer v0.8.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-parse-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-write-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.65 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-core v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.11.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1`, `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 1 warning (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-migtd-policy-fuzz v0.0.0 (/src/MigTD/src/policy/fuzz) Step #3 - "compile-libfuzzer-address-x86_64":  Finished release [optimized + debuginfo] target(s) in 1m 00s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_policy Step #3 - "compile-libfuzzer-address-x86_64": policy' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ policy =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/policy Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=policy Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/policy /workspace/out/libfuzzer-address-x86_64/policy-policy Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/migtd =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/migtd' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded base64 v0.21.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.86 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling static_assertions v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.12.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-util v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.117 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.22.0 (/src/MigTD/deps/rustls/rustls) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling base64 v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd v0.4.3 (/src/MigTD/src/migtd) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling base64 v0.21.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error-attr v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pemfile v2.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-write-integer v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-parse-integer v0.8.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-parse-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-write-float v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.65 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lexical-core v0.8.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.11.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-loader v0.1.0 (/src/MigTD/deps/td-shim/td-loader) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1`, `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling policy v0.1.0 (/src/MigTD/src/policy) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::ratls` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:20:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | use crate::ratls; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_DEC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:23:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | const TDCS_FIELD_MIG_DEC_KEY: u64 = 0x9810_0003_0000_0010; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_ENC_KEY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:24:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | const TDCS_FIELD_MIG_ENC_KEY: u64 = 0x9810_0003_0000_0018; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TDCS_FIELD_MIG_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:25:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | const TDCS_FIELD_MIG_VERSION: u64 = 0x9810_0001_0000_0020; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:27:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | const GSM_FIELD_MIN_EXPORT_VERSION: u64 = 0x2000000100000001; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_EXPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:28:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | const GSM_FIELD_MAX_EXPORT_VERSION: u64 = 0x2000000100000002; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MIN_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:29:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 | const GSM_FIELD_MIN_IMPORT_VERSION: u64 = 0x2000000100000003; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `GSM_FIELD_MAX_IMPORT_VERSION` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:30:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 30 | const GSM_FIELD_MAX_IMPORT_VERSION: u64 = 0x2000000100000004; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: fields `min_ver`, `max_ver`, and `key` are never read Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:51:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 50 | struct ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  |  ------------------- fields in this struct Step #3 - "compile-libfuzzer-address-x86_64": 51 |  min_ver: u16, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 52 |  max_ver: u16, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 53 |  key: MigrationSessionKey, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: methods `as_bytes` and `as_bytes_mut` are never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:67:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 66 | impl ExchangeInformation { Step #3 - "compile-libfuzzer-address-x86_64":  | ------------------------ methods in this implementation Step #3 - "compile-libfuzzer-address-x86_64": 67 |  fn as_bytes(&self) -> &[u8] { Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 71 |  fn as_bytes_mut(&mut self) -> &mut [u8] { Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `Complete` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:79:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 76 | enum MigrationState { Step #3 - "compile-libfuzzer-address-x86_64":  |  -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 79 |  Complete(RequestInformation), Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `cal_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:488:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 488 | fn cal_mig_version( Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: function `set_mig_version` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/migtd/src/migration/session.rs:520:4 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 520 | fn set_mig_version(info: &MigrationInformation, mig_ver: u16) -> Result<()> { Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd` (lib) generated 13 warnings (run `cargo fix --lib -p migtd` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 1 warning (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling migtd-fuzz v0.0.0 (/src/MigTD/src/migtd/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: variant `NoCertificatesPresented` is never constructed Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub enum MigrationError { Step #3 - "compile-libfuzzer-address-x86_64":  |  -------------- variant in this enum Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 14 |  NoCertificatesPresented, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `MigrationError` has a derived impl for the trait `Debug`, but this is intentionally ignored during dead code analysis Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/service_response.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_service_response(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `std::result::Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_service_response.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_service_response(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "afl_service_response") generated 3 warnings (1 duplicate) Step #3 - "compile-libfuzzer-address-x86_64": warning: `migtd-fuzz` (bin "service_response") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Finished release [optimized + debuginfo] target(s) in 55.66s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_service_response Step #3 - "compile-libfuzzer-address-x86_64": service_response' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ service_response =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=service_response Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/migtd Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=migtd Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/service_response /workspace/out/libfuzzer-address-x86_64/migtd-service_response Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/vsock =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/vsock' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/vsock Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64": warning: /src/MigTD/src/devices/vsock/Cargo.toml: unused manifest key: dependencies.td-payload.feature Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling typenum v1.17.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling byteorder v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustix v0.38.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling r-efi v3.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linux-raw-sys v0.4.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling anyhow v1.0.86 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling either v1.12.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling home v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cpufeatures v0.2.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86 v0.47.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling raw-cpuid v10.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_json v1.0.117 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitfield v0.13.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling atomic_refcell v0.1.13 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling generic-array v0.14.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spinning_top v0.2.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling linked_list_allocator v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.65 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-common v0.1.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling block-buffer v0.10.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling digest v0.10.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sha2 v0.10.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling which v5.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.11.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy-derive v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling serde_derive v1.0.202 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-exception v0.1.0 (/src/MigTD/deps/td-shim/td-exception) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-logger v0.1.0 (/src/MigTD/deps/td-shim/td-logger) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zerocopy v0.7.34 Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:478:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 478 |  let command = self.read_u16(0x4); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:479:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 479 |  let status = self.read_u16(0x6); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:513:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 513 |  let mut size = self.read_u64(current_bar_offset); Step #3 - "compile-libfuzzer-address-x86_64":  |  ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  |  | Step #3 - "compile-libfuzzer-address-x86_64":  |  help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:547:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 373 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 547 |  fn get_bar_size(&self, offset: u8) -> u32 { Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim-interface v0.1.0 (/src/MigTD/deps/td-shim/td-shim-interface) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc-measurement v0.1.0 (/src/MigTD/deps/td-shim/cc-measurement) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-layout v0.1.0 (/src/MigTD/deps/td-shim/td-layout) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 5 warnings (run `cargo fix --lib -p pci` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-shim v0.1.0 (/src/MigTD/deps/td-shim/td-shim) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-paging v0.1.0 (/src/MigTD/deps/td-shim/td-paging) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling td-payload v0.1.0 (/src/MigTD/deps/td-shim/td-payload) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock v0.1.0 (/src/MigTD/src/devices/vsock) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `td_payload::arch::idt::register` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:7:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | use td_payload::arch::idt::register; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `vector` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:17:26 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub fn register_callback(vector: u8, cb: unsafe extern "C" fn()) {} Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^ help: if this is intentional, prefix it with an underscore: `_vector` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `cb` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/vsock/src/transport/event.rs:17:38 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub fn register_callback(vector: u8, cb: unsafe extern "C" fn()) {} Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^ help: if this is intentional, prefix it with an underscore: `_cb` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock` (lib) generated 3 warnings (run `cargo fix --lib -p vsock` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling vsock-fuzz v0.0.0 (/src/MigTD/src/devices/vsock/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PciDevice`, `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:8:15 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | pub use pci::{get_fuzz_seed_address, PciDevice, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:9:18 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | pub use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `Mutex`, `once::Once` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:8:12 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use spin::{once::Once, Mutex}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^ ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `std::thread::spawn` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:9:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | use std::thread::spawn; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `Result` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:10:46 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | use virtio::{virtio_pci::VirtioPciTransport, Result}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:116:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 116 |  let device_addr = paddr - PAGE_SIZE as u64 + 0x100 + 0x200; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_device_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:19:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:20:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:21:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_2` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:31:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 | const USED_LEN_VAL_2: u16 = 2; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_4` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:32:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 32 | const USED_LEN_VAL_4: u16 = 4; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `USED_LEN_VAL_6` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:33:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 33 | const USED_LEN_VAL_6: u16 = 6; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `FIRST_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:36:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 | const FIRST_USED_LEN_OFFSET: u64 = 16; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TWO_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:37:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 | const TWO_USED_LEN_OFFSET: u64 = 24; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `THREE_USED_LEN_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:38:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 | const THREE_USED_LEN_OFFSET: u64 = 32; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:11:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 | pub const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PAGE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:13:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | pub const PAGE_SIZE: usize = 0x1000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:14:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:15:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:16:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 16 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:18:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 18 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:22:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 22 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:113:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 113 |  let _ = register_vsock_device(VsockDevice::new(Box::new(vsock_transport))); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:147:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 147 |  let _ = server_socket.connect(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-vsock.rs:148:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 148 |  let _ = server_socket.bind(&listen_addrss); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `vsock-fuzz` (bin "afl_vsock") generated 30 warnings (run `cargo fix --bin "afl_vsock"` to apply 8 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished release [optimized + debuginfo] target(s) in 22.78s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_vsock Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_vsock =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/devices/virtio =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/devices/virtio' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/devices/virtio Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Updating git repository `https://github.com/rcore-os/bitmap-allocator` Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scopeguard v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.21 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-util v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling conquer-once v0.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitmap-allocator v0.1.0 (https://github.com/rcore-os/bitmap-allocator?rev=03bd9909#03bd9909) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lock_api v0.4.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll_derive v0.10.5 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling scroll v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling tdx-tdcall v0.1.0 (/src/MigTD/deps/td-shim/tdx-tdcall) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pci v0.1.0 (/src/MigTD/src/devices/pci) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `command` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:478:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 478 |  let command = self.read_u16(0x4); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^ help: if this is intentional, prefix it with an underscore: `_command` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `status` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:479:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 479 |  let status = self.read_u16(0x6); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^ help: if this is intentional, prefix it with an underscore: `_status` Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: variable does not need to be mutable Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:513:29 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 513 |  let mut size = self.read_u64(current_bar_offset); Step #3 - "compile-libfuzzer-address-x86_64":  |  ----^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  |  | Step #3 - "compile-libfuzzer-address-x86_64":  |  help: remove this `mut` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_mut)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PCI_EX_BAR_BASE_ADDRESS` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const PCI_EX_BAR_BASE_ADDRESS: u64 = 0xE0000000u64; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: method `get_bar_size` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/src/devices/pci/src/config.rs:547:8 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 373 | impl PciDevice { Step #3 - "compile-libfuzzer-address-x86_64":  | -------------- method in this implementation Step #3 - "compile-libfuzzer-address-x86_64": ... Step #3 - "compile-libfuzzer-address-x86_64": 547 |  fn get_bar_size(&self, offset: u8) -> u32 { Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio v0.1.0 (/src/MigTD/src/devices/virtio) Step #3 - "compile-libfuzzer-address-x86_64": warning: `pci` (lib) generated 5 warnings (run `cargo fix --lib -p pci` to apply 3 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling virtio-fuzz v0.0.0 (/src/MigTD/src/devices/virtio/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `crate::fuzzlib::dma_alloc::virtio_dma_alloc` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:5:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | use crate::fuzzlib::dma_alloc::virtio_dma_alloc; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `conquer_once::spin::OnceCell` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:6:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use conquer_once::spin::OnceCell; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `VirtQueueLayout` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:12:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 12 |  virtqueue::{VirtQueue, VirtQueueLayout, VirtqueueBuf}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `get_fuzz_seed_address` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:6:28 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 6 | use fuzzlib::{fuzz_virtio, get_fuzz_seed_address, init, COMMON_HEADER}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused import: `pci::PciDevice` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:7:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | use pci::PciDevice; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `VirtioTransport`, `virtio_pci::VirtioPciTransport`, `virtqueue::VirtQueue` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:8:14 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 | use virtio::{virtio_pci::VirtioPciTransport, virtqueue::VirtQueue, VirtioTransport}; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused variable: `common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:29:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let common_addr = 0; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^ help: if this is intentional, prefix it with an underscore: `_common_addr` Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_variables)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VIRTIO_SUBSYSTEM_VSOCK` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:10:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 10 | const VIRTIO_SUBSYSTEM_VSOCK: u32 = 19; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:13:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 | const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:14:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 14 | const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl-virtio.rs:15:7 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 | const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:17:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | pub const PTR_OFFSET: u64 = 0x10000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_1_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:19:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | pub const BARU64_1_OFFSET: u64 = 0x10; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_2_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:20:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 20 | pub const BARU64_2_OFFSET: u64 = 0x18; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `BARU64_3_OFFSET` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:21:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 | pub const BARU64_3_OFFSET: u64 = 0x20; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `VEC_CAPACITY` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:23:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 | pub const VEC_CAPACITY: usize = 0x10000_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `TD_PAYLOAD_DMA_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:24:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 24 | pub const TD_PAYLOAD_DMA_SIZE: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `PTR_ALIGN_VAR` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:25:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 | pub const PTR_ALIGN_VAR: u64 = 0xffff_ffff_ffff_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `DATA_LEN` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:27:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 27 | pub const DATA_LEN: usize = 0x100_0000; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: constant `QUEUE_SIZE` is never used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:28:11 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 | pub const QUEUE_SIZE: usize = 16; Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:34:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let _ = transport.reset(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:35:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 35 |  let _ = transport.set_status(1); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:36:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let _ = transport.add_status(64); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:37:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 37 |  let _ = transport.get_status(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:38:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 38 |  let _ = transport.set_features(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:39:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 39 |  let _ = transport.get_features(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:40:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 40 |  let _ = transport.set_queue(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:41:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 41 |  let _ = transport.set_queue_size(4); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:42:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 42 |  let _ = transport.set_queue_enable(); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzzlib.rs:44:9 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 44 |  let _ = transport.read_device_config(0); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `virtio-fuzz` (bin "afl_virtio") generated 30 warnings (run `cargo fix --bin "afl_virtio"` to apply 7 suggestions) Step #3 - "compile-libfuzzer-address-x86_64":  Finished release [optimized + debuginfo] target(s) in 9.35s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs=afl_virtio Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_virtio =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for CRATE_DIR in ${FUZZ_CRATE_DIRS[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ /src/MigTD/./src/crypto =~ deps ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo 'Building crate: /src/MigTD/./src/crypto' Step #3 - "compile-libfuzzer-address-x86_64": Building crate: /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.155 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling version_check v0.9.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustversion v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling powerfmt v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v1.0.109 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.5.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time-core v0.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-conv v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bit_field v0.10.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling volatile v0.4.6 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling spin v0.9.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling untrusted v0.9.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pki-types v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls v0.22.0 (/src/MigTD/deps/rustls/rustls) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling subtle v2.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling base64 v0.22.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling zeroize v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling const-oid v0.7.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.1.3 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling lazy_static v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling deranged v0.3.11 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-pemfile v2.1.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ahash v0.7.8 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error-attr v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro-error v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling x86_64 v0.14.12 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling getrandom v0.2.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling time v0.3.36 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling hashbrown v0.11.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling sys_time v0.1.0 (/src/MigTD/src/std-support/sys_time) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ring v0.17.6 (/src/MigTD/deps/td-shim/library/ring) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rust_std_stub v0.1.0 (/src/MigTD/src/std-support/rust-std-stub) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der_derive v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling der v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64": warning: unused imports: `PKCS1`, `PSS` Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/MigTD/deps/td-shim/library/ring/src/rsa/padding.rs:21:13 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 21 |  pkcs1::{PKCS1, RSA_PKCS1_SHA256, RSA_PKCS1_SHA384, RSA_PKCS1_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64": 22 |  pss::{PSS, RSA_PSS_SHA256, RSA_PSS_SHA384, RSA_PSS_SHA512}, Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_imports)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64":  Compiling rustls-webpki v0.102.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto v0.1.0 (/src/MigTD/src/crypto) Step #3 - "compile-libfuzzer-address-x86_64": warning: `ring` (lib) generated 1 warning (run `cargo fix --lib -p ring` to apply 1 suggestion) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crypto-fuzz v0.0.0 (/src/MigTD/src/crypto/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/x509.rs:13:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  let _ = fuzz_x509(data); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:19:17 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unused_must_use)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unused `Result` that must be used Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/afl_x509.rs:28:21 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  |  ^^^^^^^^^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: this `Result` may be an `Err` variant, which should be handled Step #3 - "compile-libfuzzer-address-x86_64": help: use `let _ = ...` to ignore the resulting value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  let _ = fuzz_x509(data.as_slice()); Step #3 - "compile-libfuzzer-address-x86_64":  | +++++++ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "afl_x509") generated 2 warnings Step #3 - "compile-libfuzzer-address-x86_64": warning: `crypto-fuzz` (bin "x509") generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64":  Finished release [optimized + debuginfo] target(s) in 50.66s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=fuzz/target/x86_64-unknown-linux-gnu/release Step #3 - "compile-libfuzzer-address-x86_64": ++ cargo fuzz list Step #3 - "compile-libfuzzer-address-x86_64": + fuzz_tcs='afl_x509 Step #3 - "compile-libfuzzer-address-x86_64": x509' Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ afl_x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + continue Step #3 - "compile-libfuzzer-address-x86_64": + for tcs in ${fuzz_tcs[@]} Step #3 - "compile-libfuzzer-address-x86_64": + [[ x509 =~ afl ]] Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=x509 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/MigTD/./src/crypto Step #3 - "compile-libfuzzer-address-x86_64": + CRATE_NAME=crypto Step #3 - "compile-libfuzzer-address-x86_64": + cp fuzz/target/x86_64-unknown-linux-gnu/release/x509 /workspace/out/libfuzzer-address-x86_64/crypto-x509 Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 9e47fb9dd199: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 905e641a4b54: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:089b107c1bd031393a38687ed4419e9004ee25de7f70f0deeb17b53250151615 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvqarmlop/crypto-x509 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvqarmlop/migtd-service_response Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpvqarmlop/policy-policy Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/migtd Step #6: adding: crypto-x509 (deflated 73%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: migtd-service_response (deflated 74%) Step #6: adding: policy-policy (deflated 73%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 148 0 0 100 148 0 719 --:--:-- --:--:-- --:--:-- 718 100 148 0 0 100 148 0 633 --:--:-- --:--:-- --:--:-- 632 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 44.8M 0 0 100 44.8M 0 87.9M --:--:-- --:--:-- --:--:-- 87.8M 100 44.8M 0 0 100 44.8M 0 87.9M --:--:-- --:--:-- --:--:-- 87.8M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 49 0 0 100 49 0 146 --:--:-- --:--:-- --:--:-- 146 100 49 0 0 100 49 0 146 --:--:-- --:--:-- --:--:-- 146 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 30 0 0 100 30 0 147 --:--:-- --:--:-- --:--:-- 148 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/migtd Finished Step #11 PUSH DONE