starting build "3253dff5-94a8-421e-a187-51c998c889b0" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: a977fd1d1d2c: Pulling fs layer Step #1: b7af597d0683: Pulling fs layer Step #1: 0ad851ab79a7: Pulling fs layer Step #1: 32d6a845953a: Pulling fs layer Step #1: 13291e1f0083: Pulling fs layer Step #1: 12c3fa064ec9: Pulling fs layer Step #1: 5bf877a30e45: Pulling fs layer Step #1: 12c76ab55805: Pulling fs layer Step #1: bcee33c0f2c5: Pulling fs layer Step #1: 00901539164e: Pulling fs layer Step #1: 652e81a6c3ce: Pulling fs layer Step #1: 2bd7184f3186: Pulling fs layer Step #1: 6ef14a282d78: Pulling fs layer Step #1: f0b30797ba63: Pulling fs layer Step #1: c255474facb8: Pulling fs layer Step #1: 2037056aed43: Pulling fs layer Step #1: 0ad851ab79a7: Waiting Step #1: 4ea8cc67e5b1: Pulling fs layer Step #1: 32d6a845953a: Waiting Step #1: 1593bc33732e: Pulling fs layer Step #1: 13291e1f0083: Waiting Step #1: fac862d0d976: Pulling fs layer Step #1: 12c3fa064ec9: Waiting Step #1: 8a5f772dc665: Pulling fs layer Step #1: 5bf877a30e45: Waiting Step #1: a682fa05afee: Pulling fs layer Step #1: 50ae31b489cf: Pulling fs layer Step #1: bcfe6fcb5c6a: Pulling fs layer Step #1: 652e81a6c3ce: Waiting Step #1: 88ea93146e84: Pulling fs layer Step #1: 912a9adfcdcb: Pulling fs layer Step #1: 7ec1d093c1da: Pulling fs layer Step #1: 00901539164e: Waiting Step #1: 2bd7184f3186: Waiting Step #1: 12c76ab55805: Waiting Step #1: 6ef14a282d78: Waiting Step #1: 8c8a3977119b: Pulling fs layer Step #1: c255474facb8: Waiting Step #1: f0b30797ba63: Waiting Step #1: 7e3654bd47ef: Pulling fs layer Step #1: 2037056aed43: Waiting Step #1: 390d9580ed9e: Pulling fs layer Step #1: 4ea8cc67e5b1: Waiting Step #1: bcee33c0f2c5: Waiting Step #1: dcd9de8bf193: Pulling fs layer Step #1: 1593bc33732e: Waiting Step #1: f97e0fb3e819: Pulling fs layer Step #1: fac862d0d976: Waiting Step #1: 912a9adfcdcb: Waiting Step #1: d17eb7fa6caf: Pulling fs layer Step #1: 8a5f772dc665: Waiting Step #1: 8c8a3977119b: Waiting Step #1: a682fa05afee: Waiting Step #1: 50ae31b489cf: Waiting Step #1: 7e3654bd47ef: Waiting Step #1: 390d9580ed9e: Waiting Step #1: dcd9de8bf193: Waiting Step #1: bcfe6fcb5c6a: Waiting Step #1: f97e0fb3e819: Waiting Step #1: d17eb7fa6caf: Waiting Step #1: b7af597d0683: Verifying Checksum Step #1: b7af597d0683: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 32d6a845953a: Verifying Checksum Step #1: 32d6a845953a: Download complete Step #1: 13291e1f0083: Verifying Checksum Step #1: 13291e1f0083: Download complete Step #1: 0ad851ab79a7: Verifying Checksum Step #1: 0ad851ab79a7: Download complete Step #1: 5bf877a30e45: Verifying Checksum Step #1: 5bf877a30e45: Download complete Step #1: a977fd1d1d2c: Verifying Checksum Step #1: a977fd1d1d2c: Download complete Step #1: 12c76ab55805: Verifying Checksum Step #1: 12c76ab55805: Download complete Step #1: b549f31133a9: Pull complete Step #1: 00901539164e: Verifying Checksum Step #1: 00901539164e: Download complete Step #1: 652e81a6c3ce: Verifying Checksum Step #1: 652e81a6c3ce: Download complete Step #1: 2bd7184f3186: Verifying Checksum Step #1: 2bd7184f3186: Download complete Step #1: 6ef14a282d78: Verifying Checksum Step #1: 6ef14a282d78: Download complete Step #1: f0b30797ba63: Verifying Checksum Step #1: f0b30797ba63: Download complete Step #1: c255474facb8: Verifying Checksum Step #1: c255474facb8: Download complete Step #1: 2037056aed43: Verifying Checksum Step #1: 2037056aed43: Download complete Step #1: 4ea8cc67e5b1: Verifying Checksum Step #1: 4ea8cc67e5b1: Download complete Step #1: bcee33c0f2c5: Verifying Checksum Step #1: bcee33c0f2c5: Download complete Step #1: 1593bc33732e: Verifying Checksum Step #1: 1593bc33732e: Download complete Step #1: fac862d0d976: Verifying Checksum Step #1: fac862d0d976: Download complete Step #1: 8a5f772dc665: Verifying Checksum Step #1: 8a5f772dc665: Download complete Step #1: a682fa05afee: Verifying Checksum Step #1: a682fa05afee: Download complete Step #1: 50ae31b489cf: Verifying Checksum Step #1: 50ae31b489cf: Download complete Step #1: bcfe6fcb5c6a: Verifying Checksum Step #1: bcfe6fcb5c6a: Download complete Step #1: 88ea93146e84: Verifying Checksum Step #1: 88ea93146e84: Download complete Step #1: 12c3fa064ec9: Verifying Checksum Step #1: 12c3fa064ec9: Download complete Step #1: 912a9adfcdcb: Verifying Checksum Step #1: 912a9adfcdcb: Download complete Step #1: 8c8a3977119b: Verifying Checksum Step #1: 8c8a3977119b: Download complete Step #1: a977fd1d1d2c: Pull complete Step #1: 7ec1d093c1da: Verifying Checksum Step #1: 7ec1d093c1da: Download complete Step #1: 390d9580ed9e: Download complete Step #1: 7e3654bd47ef: Verifying Checksum Step #1: 7e3654bd47ef: Download complete Step #1: b7af597d0683: Pull complete Step #1: dcd9de8bf193: Verifying Checksum Step #1: dcd9de8bf193: Download complete Step #1: f97e0fb3e819: Verifying Checksum Step #1: f97e0fb3e819: Download complete Step #1: 0ad851ab79a7: Pull complete Step #1: 32d6a845953a: Pull complete Step #1: 13291e1f0083: Pull complete Step #1: d17eb7fa6caf: Verifying Checksum Step #1: d17eb7fa6caf: Download complete Step #1: 12c3fa064ec9: Pull complete Step #1: 5bf877a30e45: Pull complete Step #1: 12c76ab55805: Pull complete Step #1: bcee33c0f2c5: Pull complete Step #1: 00901539164e: Pull complete Step #1: 652e81a6c3ce: Pull complete Step #1: 2bd7184f3186: Pull complete Step #1: 6ef14a282d78: Pull complete Step #1: f0b30797ba63: Pull complete Step #1: c255474facb8: Pull complete Step #1: 2037056aed43: Pull complete Step #1: 4ea8cc67e5b1: Pull complete Step #1: 1593bc33732e: Pull complete Step #1: fac862d0d976: Pull complete Step #1: 8a5f772dc665: Pull complete Step #1: a682fa05afee: Pull complete Step #1: 50ae31b489cf: Pull complete Step #1: bcfe6fcb5c6a: Pull complete Step #1: 88ea93146e84: Pull complete Step #1: 912a9adfcdcb: Pull complete Step #1: 7ec1d093c1da: Pull complete Step #1: 8c8a3977119b: Pull complete Step #1: 7e3654bd47ef: Pull complete Step #1: 390d9580ed9e: Pull complete Step #1: dcd9de8bf193: Pull complete Step #1: f97e0fb3e819: Pull complete Step #1: d17eb7fa6caf: Pull complete Step #1: Digest: sha256:6ae4900e381e72a8b289796615870dafe781dd8b5ea78325ea5fb7d920e7d95c Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 3f05e6bfa4aa Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/dtolnay/serde-yaml serde-yaml Step #1: ---> Running in 5d2dcf7b6fc7 Step #1: Cloning into 'serde-yaml'... Step #1: Removing intermediate container 5d2dcf7b6fc7 Step #1: ---> 72721d080cc2 Step #1: Step 3/4 : WORKDIR $SRC Step #1: ---> Running in 256f78ef621e Step #1: Removing intermediate container 256f78ef621e Step #1: ---> f4b8935afeec Step #1: Step 4/4 : COPY build.sh $SRC/ Step #1: ---> 2b3d1f3da67e Step #1: Successfully built 2b3d1f3da67e Step #1: Successfully tagged gcr.io/oss-fuzz/serde-yaml:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/serde-yaml Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filevg0BGL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/serde-yaml/.git Step #2 - "srcmap": + GIT_DIR=/src/serde-yaml Step #2 - "srcmap": + cd /src/serde-yaml Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dtolnay/serde-yaml Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2009506d33767dfc88e979d6bc0d53d09f941c94 Step #2 - "srcmap": + jq_inplace /tmp/filevg0BGL '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileuhahA9 Step #2 - "srcmap": + cat /tmp/filevg0BGL Step #2 - "srcmap": + jq '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": + mv /tmp/fileuhahA9 /tmp/filevg0BGL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filevg0BGL Step #2 - "srcmap": + rm /tmp/filevg0BGL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/serde-yaml": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dtolnay/serde-yaml", Step #2 - "srcmap": "rev": "2009506d33767dfc88e979d6bc0d53d09f941c94" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.210 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.158 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.1.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.158 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.210 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0658]: `#[diagnostic]` attribute name space is experimental Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/serde-1.0.210/src/de/mod.rs:536:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 536 |  diagnostic::on_unimplemented( Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see issue #111996 for more information Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: add `#![feature(diagnostic_namespace)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: this compiler was built on 2024-02-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0658]: `#[diagnostic]` attribute name space is experimental Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/serde-1.0.210/src/ser/mod.rs:220:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 220 |  diagnostic::on_unimplemented( Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see issue #111996 for more information Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: add `#![feature(diagnostic_namespace)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: this compiler was built on 2024-02-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.1.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": For more information about this error, try `rustc --explain E0658`. Step #3 - "compile-libfuzzer-coverage-x86_64": The following warnings were emitted during compilation: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: could not compile `serde` (lib) due to 2 previous errors Step #3 - "compile-libfuzzer-coverage-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1