starting build "850ce638-68a1-4876-a7aa-294360092659" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: dec9309a56ea: Pulling fs layer Step #1: 2ac36f2efd79: Pulling fs layer Step #1: 5ec988cea38a: Pulling fs layer Step #1: 8e683fb379e8: Pulling fs layer Step #1: 9f891fba8c78: Pulling fs layer Step #1: 25fcf1e6241b: Pulling fs layer Step #1: c668a360339d: Pulling fs layer Step #1: 68e87b77edb8: Pulling fs layer Step #1: f5fb4d6cfdaa: Pulling fs layer Step #1: 51633e1517b0: Pulling fs layer Step #1: e52d90295922: Pulling fs layer Step #1: be0d3e2ef6e6: Pulling fs layer Step #1: 1548ad8a9b5b: Pulling fs layer Step #1: 0f856dba2078: Pulling fs layer Step #1: 2b3f31e343f8: Pulling fs layer Step #1: 366fb5c452b5: Pulling fs layer Step #1: 9321548b138a: Pulling fs layer Step #1: a49b199fd9f5: Pulling fs layer Step #1: c38cc9d0658a: Pulling fs layer Step #1: 6e2b2f2f8224: Pulling fs layer Step #1: f5e25dc75102: Pulling fs layer Step #1: 1cc1ba13f99c: Pulling fs layer Step #1: 5ec988cea38a: Waiting Step #1: 27e24efb6f46: Pulling fs layer Step #1: d53d3aad68cc: Pulling fs layer Step #1: 8e683fb379e8: Waiting Step #1: 820601777549: Pulling fs layer Step #1: 77cc868e2038: Pulling fs layer Step #1: 25fcf1e6241b: Waiting Step #1: 9f891fba8c78: Waiting Step #1: b51458c0a6fb: Pulling fs layer Step #1: 57e64755c0e5: Pulling fs layer Step #1: c668a360339d: Waiting Step #1: be0d3e2ef6e6: Waiting Step #1: 46db2ee818a9: Pulling fs layer Step #1: 51633e1517b0: Waiting Step #1: 1548ad8a9b5b: Waiting Step #1: 992e6bdb5ffa: Pulling fs layer Step #1: e52d90295922: Waiting Step #1: 0f856dba2078: Waiting Step #1: 16b329d45733: Pulling fs layer Step #1: ef7fcdab2bae: Pulling fs layer Step #1: 2b3f31e343f8: Waiting Step #1: 68e87b77edb8: Waiting Step #1: 57e64755c0e5: Waiting Step #1: d53d3aad68cc: Waiting Step #1: f5fb4d6cfdaa: Waiting Step #1: 46db2ee818a9: Waiting Step #1: 820601777549: Waiting Step #1: 366fb5c452b5: Waiting Step #1: 77cc868e2038: Waiting Step #1: 9321548b138a: Waiting Step #1: 6e2b2f2f8224: Waiting Step #1: 992e6bdb5ffa: Waiting Step #1: b51458c0a6fb: Waiting Step #1: a49b199fd9f5: Waiting Step #1: f5e25dc75102: Waiting Step #1: 16b329d45733: Waiting Step #1: c38cc9d0658a: Waiting Step #1: 27e24efb6f46: Waiting Step #1: 1cc1ba13f99c: Waiting Step #1: ef7fcdab2bae: Waiting Step #1: 2ac36f2efd79: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8e683fb379e8: Verifying Checksum Step #1: 8e683fb379e8: Download complete Step #1: 5ec988cea38a: Verifying Checksum Step #1: 5ec988cea38a: Download complete Step #1: 9f891fba8c78: Verifying Checksum Step #1: 9f891fba8c78: Download complete Step #1: c668a360339d: Verifying Checksum Step #1: c668a360339d: Download complete Step #1: dec9309a56ea: Verifying Checksum Step #1: dec9309a56ea: Download complete Step #1: 68e87b77edb8: Verifying Checksum Step #1: 68e87b77edb8: Download complete Step #1: b549f31133a9: Pull complete Step #1: 51633e1517b0: Verifying Checksum Step #1: 51633e1517b0: Download complete Step #1: e52d90295922: Verifying Checksum Step #1: e52d90295922: Download complete Step #1: be0d3e2ef6e6: Verifying Checksum Step #1: be0d3e2ef6e6: Download complete Step #1: 1548ad8a9b5b: Verifying Checksum Step #1: 1548ad8a9b5b: Download complete Step #1: 0f856dba2078: Download complete Step #1: 2b3f31e343f8: Verifying Checksum Step #1: 2b3f31e343f8: Download complete Step #1: 366fb5c452b5: Verifying Checksum Step #1: 366fb5c452b5: Download complete Step #1: f5fb4d6cfdaa: Verifying Checksum Step #1: f5fb4d6cfdaa: Download complete Step #1: 9321548b138a: Verifying Checksum Step #1: 9321548b138a: Download complete Step #1: a49b199fd9f5: Verifying Checksum Step #1: a49b199fd9f5: Download complete Step #1: c38cc9d0658a: Verifying Checksum Step #1: c38cc9d0658a: Download complete Step #1: 6e2b2f2f8224: Verifying Checksum Step #1: 6e2b2f2f8224: Download complete Step #1: 1cc1ba13f99c: Verifying Checksum Step #1: 1cc1ba13f99c: Download complete Step #1: f5e25dc75102: Verifying Checksum Step #1: f5e25dc75102: Download complete Step #1: 27e24efb6f46: Download complete Step #1: d53d3aad68cc: Verifying Checksum Step #1: d53d3aad68cc: Download complete Step #1: 25fcf1e6241b: Verifying Checksum Step #1: 25fcf1e6241b: Download complete Step #1: 820601777549: Verifying Checksum Step #1: 820601777549: Download complete Step #1: 77cc868e2038: Verifying Checksum Step #1: 77cc868e2038: Download complete Step #1: b51458c0a6fb: Verifying Checksum Step #1: b51458c0a6fb: Download complete Step #1: 57e64755c0e5: Verifying Checksum Step #1: 57e64755c0e5: Download complete Step #1: 992e6bdb5ffa: Verifying Checksum Step #1: 992e6bdb5ffa: Download complete Step #1: 46db2ee818a9: Download complete Step #1: 16b329d45733: Verifying Checksum Step #1: 16b329d45733: Download complete Step #1: dec9309a56ea: Pull complete Step #1: 2ac36f2efd79: Pull complete Step #1: ef7fcdab2bae: Verifying Checksum Step #1: ef7fcdab2bae: Download complete Step #1: 5ec988cea38a: Pull complete Step #1: 8e683fb379e8: Pull complete Step #1: 9f891fba8c78: Pull complete Step #1: 25fcf1e6241b: Pull complete Step #1: c668a360339d: Pull complete Step #1: 68e87b77edb8: Pull complete Step #1: f5fb4d6cfdaa: Pull complete Step #1: 51633e1517b0: Pull complete Step #1: e52d90295922: Pull complete Step #1: be0d3e2ef6e6: Pull complete Step #1: 1548ad8a9b5b: Pull complete Step #1: 0f856dba2078: Pull complete Step #1: 2b3f31e343f8: Pull complete Step #1: 366fb5c452b5: Pull complete Step #1: 9321548b138a: Pull complete Step #1: a49b199fd9f5: Pull complete Step #1: c38cc9d0658a: Pull complete Step #1: 6e2b2f2f8224: Pull complete Step #1: f5e25dc75102: Pull complete Step #1: 1cc1ba13f99c: Pull complete Step #1: 27e24efb6f46: Pull complete Step #1: d53d3aad68cc: Pull complete Step #1: 820601777549: Pull complete Step #1: 77cc868e2038: Pull complete Step #1: b51458c0a6fb: Pull complete Step #1: 57e64755c0e5: Pull complete Step #1: 46db2ee818a9: Pull complete Step #1: 992e6bdb5ffa: Pull complete Step #1: 16b329d45733: Pull complete Step #1: ef7fcdab2bae: Pull complete Step #1: Digest: sha256:19aa90ebca7df4f1b00fce3ccebb1ea67862fdd42fd2e9af5704de78fe2b27fe Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 61bfee3a5cda Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/dtolnay/serde-yaml serde-yaml Step #1: ---> Running in 52ec4442d251 Step #1: Cloning into 'serde-yaml'... Step #1: Removing intermediate container 52ec4442d251 Step #1: ---> 0421dc946d28 Step #1: Step 3/4 : WORKDIR $SRC Step #1: ---> Running in b7ddde1e2811 Step #1: Removing intermediate container b7ddde1e2811 Step #1: ---> 72b8980bbc2c Step #1: Step 4/4 : COPY build.sh $SRC/ Step #1: ---> 7a78a948ff99 Step #1: Successfully built 7a78a948ff99 Step #1: Successfully tagged gcr.io/oss-fuzz/serde-yaml:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/serde-yaml Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileTyKK6P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/serde-yaml/.git Step #2 - "srcmap": + GIT_DIR=/src/serde-yaml Step #2 - "srcmap": + cd /src/serde-yaml Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dtolnay/serde-yaml Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2009506d33767dfc88e979d6bc0d53d09f941c94 Step #2 - "srcmap": + jq_inplace /tmp/fileTyKK6P '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filefT10Ac Step #2 - "srcmap": + cat /tmp/fileTyKK6P Step #2 - "srcmap": + jq '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": + mv /tmp/filefT10Ac /tmp/fileTyKK6P Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileTyKK6P Step #2 - "srcmap": + rm /tmp/fileTyKK6P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/serde-yaml": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dtolnay/serde-yaml", Step #2 - "srcmap": "rev": "2009506d33767dfc88e979d6bc0d53d09f941c94" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.210 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded portable-atomic v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded once_cell v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.1.23 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.159 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.159 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.210 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling equivalent v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.18 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling once_cell v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.11 Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0658]: `#[diagnostic]` attribute name space is experimental Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/serde-1.0.210/src/de/mod.rs:536:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 536 |  diagnostic::on_unimplemented( Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see issue #111996 for more information Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: add `#![feature(diagnostic_namespace)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: this compiler was built on 2024-02-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error[E0658]: `#[diagnostic]` attribute name space is experimental Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /rust/registry/src/index.crates.io-6f17d22bba15001f/serde-1.0.210/src/ser/mod.rs:220:5 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 220 |  diagnostic::on_unimplemented( Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: see issue #111996 for more information Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: add `#![feature(diagnostic_namespace)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: this compiler was built on 2024-02-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.1.23 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": For more information about this error, try `rustc --explain E0658`. Step #3 - "compile-libfuzzer-coverage-x86_64": The following warnings were emitted during compilation: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": warning: serde@1.0.210: cargo:rustc-check-cfg requires -Zcheck-cfg flag Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: could not compile `serde` (lib) due to 2 previous errors Step #3 - "compile-libfuzzer-coverage-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1