starting build "de42ddea-9321-4837-a3e1-6cc6cd3d8a41" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 11.78kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust as builder Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 81271cf7a52d: Pulling fs layer Step #1: 076e7ea7d2be: Pulling fs layer Step #1: f972795033e0: Pulling fs layer Step #1: 955fcbf34e0c: Pulling fs layer Step #1: 3d3d7fb65ba7: Pulling fs layer Step #1: 174afde8b08f: Pulling fs layer Step #1: 45de6e62747b: Pulling fs layer Step #1: e2d79d747ed8: Pulling fs layer Step #1: ae4e2bcce13c: Pulling fs layer Step #1: 7ebb7f4ef4ba: Pulling fs layer Step #1: a3f19c78a4e0: Pulling fs layer Step #1: d5a5e8ce33af: Pulling fs layer Step #1: 73be63f18a2d: Pulling fs layer Step #1: 26e1ff8f4610: Pulling fs layer Step #1: ebd8249059d4: Pulling fs layer Step #1: f46125ccc6bc: Pulling fs layer Step #1: 1e6f40e53d7f: Pulling fs layer Step #1: bb416e3a2055: Pulling fs layer Step #1: 20b4f3764835: Pulling fs layer Step #1: 3cb217e698e8: Pulling fs layer Step #1: 17edcc97785b: Pulling fs layer Step #1: da6fa1422508: Pulling fs layer Step #1: 236229e44656: Pulling fs layer Step #1: fff17b067246: Pulling fs layer Step #1: e667c6c012a1: Pulling fs layer Step #1: 1c6dc0c7729f: Pulling fs layer Step #1: 50e898cc1c8e: Pulling fs layer Step #1: db7af1b26c60: Pulling fs layer Step #1: f96a58b6493f: Pulling fs layer Step #1: 39353ab9cbcb: Pulling fs layer Step #1: f972795033e0: Waiting Step #1: 955fcbf34e0c: Waiting Step #1: 3d3d7fb65ba7: Waiting Step #1: 174afde8b08f: Waiting Step #1: ebd8249059d4: Waiting Step #1: 73be63f18a2d: Waiting Step #1: 45de6e62747b: Waiting Step #1: 1e6f40e53d7f: Waiting Step #1: f46125ccc6bc: Waiting Step #1: bb416e3a2055: Waiting Step #1: 26e1ff8f4610: Waiting Step #1: e2d79d747ed8: Waiting Step #1: e667c6c012a1: Waiting Step #1: 20b4f3764835: Waiting Step #1: ae4e2bcce13c: Waiting Step #1: da6fa1422508: Waiting Step #1: 1c6dc0c7729f: Waiting Step #1: 3cb217e698e8: Waiting Step #1: 7ebb7f4ef4ba: Waiting Step #1: 236229e44656: Waiting Step #1: 50e898cc1c8e: Waiting Step #1: 17edcc97785b: Waiting Step #1: fff17b067246: Waiting Step #1: a3f19c78a4e0: Waiting Step #1: d5a5e8ce33af: Waiting Step #1: db7af1b26c60: Waiting Step #1: 39353ab9cbcb: Waiting Step #1: 076e7ea7d2be: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f972795033e0: Verifying Checksum Step #1: f972795033e0: Download complete Step #1: 955fcbf34e0c: Verifying Checksum Step #1: 955fcbf34e0c: Download complete Step #1: 3d3d7fb65ba7: Verifying Checksum Step #1: 3d3d7fb65ba7: Download complete Step #1: 45de6e62747b: Verifying Checksum Step #1: 45de6e62747b: Download complete Step #1: e2d79d747ed8: Verifying Checksum Step #1: e2d79d747ed8: Download complete Step #1: 81271cf7a52d: Verifying Checksum Step #1: 81271cf7a52d: Download complete Step #1: 7ebb7f4ef4ba: Verifying Checksum Step #1: 7ebb7f4ef4ba: Download complete Step #1: a3f19c78a4e0: Verifying Checksum Step #1: a3f19c78a4e0: Download complete Step #1: d5a5e8ce33af: Verifying Checksum Step #1: d5a5e8ce33af: Download complete Step #1: 73be63f18a2d: Verifying Checksum Step #1: 73be63f18a2d: Download complete Step #1: 26e1ff8f4610: Download complete Step #1: b549f31133a9: Pull complete Step #1: ebd8249059d4: Download complete Step #1: f46125ccc6bc: Verifying Checksum Step #1: f46125ccc6bc: Download complete Step #1: 1e6f40e53d7f: Verifying Checksum Step #1: 1e6f40e53d7f: Download complete Step #1: bb416e3a2055: Verifying Checksum Step #1: bb416e3a2055: Download complete Step #1: 20b4f3764835: Verifying Checksum Step #1: 20b4f3764835: Download complete Step #1: 3cb217e698e8: Verifying Checksum Step #1: 3cb217e698e8: Download complete Step #1: ae4e2bcce13c: Verifying Checksum Step #1: ae4e2bcce13c: Download complete Step #1: 17edcc97785b: Verifying Checksum Step #1: 17edcc97785b: Download complete Step #1: da6fa1422508: Verifying Checksum Step #1: da6fa1422508: Download complete Step #1: 236229e44656: Verifying Checksum Step #1: 236229e44656: Download complete Step #1: fff17b067246: Verifying Checksum Step #1: fff17b067246: Download complete Step #1: e667c6c012a1: Verifying Checksum Step #1: e667c6c012a1: Download complete Step #1: 50e898cc1c8e: Verifying Checksum Step #1: 50e898cc1c8e: Download complete Step #1: 1c6dc0c7729f: Verifying Checksum Step #1: 1c6dc0c7729f: Download complete Step #1: db7af1b26c60: Verifying Checksum Step #1: db7af1b26c60: Download complete Step #1: f96a58b6493f: Verifying Checksum Step #1: f96a58b6493f: Download complete Step #1: 174afde8b08f: Verifying Checksum Step #1: 174afde8b08f: Download complete Step #1: 39353ab9cbcb: Verifying Checksum Step #1: 39353ab9cbcb: Download complete Step #1: 81271cf7a52d: Pull complete Step #1: 076e7ea7d2be: Pull complete Step #1: f972795033e0: Pull complete Step #1: 955fcbf34e0c: Pull complete Step #1: 3d3d7fb65ba7: Pull complete Step #1: 174afde8b08f: Pull complete Step #1: 45de6e62747b: Pull complete Step #1: e2d79d747ed8: Pull complete Step #1: ae4e2bcce13c: Pull complete Step #1: 7ebb7f4ef4ba: Pull complete Step #1: a3f19c78a4e0: Pull complete Step #1: d5a5e8ce33af: Pull complete Step #1: 73be63f18a2d: Pull complete Step #1: 26e1ff8f4610: Pull complete Step #1: ebd8249059d4: Pull complete Step #1: f46125ccc6bc: Pull complete Step #1: 1e6f40e53d7f: Pull complete Step #1: bb416e3a2055: Pull complete Step #1: 20b4f3764835: Pull complete Step #1: 3cb217e698e8: Pull complete Step #1: 17edcc97785b: Pull complete Step #1: da6fa1422508: Pull complete Step #1: 236229e44656: Pull complete Step #1: fff17b067246: Pull complete Step #1: e667c6c012a1: Pull complete Step #1: 1c6dc0c7729f: Pull complete Step #1: 50e898cc1c8e: Pull complete Step #1: db7af1b26c60: Pull complete Step #1: f96a58b6493f: Pull complete Step #1: 39353ab9cbcb: Pull complete Step #1: Digest: sha256:0ccb523774485eaeed5b0c5754859a353f0a4d4868fd87ddf81bc80230cc565a Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> a612925bdc6b Step #1: Step 2/5 : RUN apt-get update Step #1: ---> Running in 98821b979caa Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (111 kB/s) Step #1: Reading package lists... Step #1: Removing intermediate container 98821b979caa Step #1: ---> 81743644a1e4 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/dropbox/rust-brotli Step #1: ---> Running in cd6a4d7d7a39 Step #1: Cloning into 'rust-brotli'... Step #1: Removing intermediate container cd6a4d7d7a39 Step #1: ---> 46a3d76c194b Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> a569b1e844f8 Step #1: Step 5/5 : COPY /fuzz $SRC/rust-brotli/fuzz Step #1: ---> 21610bbebdc3 Step #1: Successfully built 21610bbebdc3 Step #1: Successfully tagged gcr.io/oss-fuzz/rust-brotli:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rust-brotli Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileOwMsXP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rust-brotli/.git Step #2 - "srcmap": + GIT_DIR=/src/rust-brotli Step #2 - "srcmap": + cd /src/rust-brotli Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dropbox/rust-brotli Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c0c36218b2cbf7a24d23acd165fb18b9e9fb6242 Step #2 - "srcmap": + jq_inplace /tmp/fileOwMsXP '."/src/rust-brotli" = { type: "git", url: "https://github.com/dropbox/rust-brotli", rev: "c0c36218b2cbf7a24d23acd165fb18b9e9fb6242" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file9ESya9 Step #2 - "srcmap": + cat /tmp/fileOwMsXP Step #2 - "srcmap": + jq '."/src/rust-brotli" = { type: "git", url: "https://github.com/dropbox/rust-brotli", rev: "c0c36218b2cbf7a24d23acd165fb18b9e9fb6242" }' Step #2 - "srcmap": + mv /tmp/file9ESya9 /tmp/fileOwMsXP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileOwMsXP Step #2 - "srcmap": + rm /tmp/fileOwMsXP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/rust-brotli": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dropbox/rust-brotli", Step #2 - "srcmap": "rev": "c0c36218b2cbf7a24d23acd165fb18b9e9fb6242" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + export 'RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -Cdebug-assertions=yes' Step #3 - "compile-libfuzzer-address-x86_64": + RUSTFLAGS='--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -Cdebug-assertions=yes' Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/rust-brotli/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded alloc-stdlib v0.2.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded alloc-no-stdlib v2.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.28 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded brotli-decompressor v2.5.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.153 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.153 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling alloc-no-stdlib v2.0.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling once_cell v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling alloc-stdlib v0.2.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling brotli-decompressor v2.5.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.28 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.0.83 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling brotli v3.4.0 (/src/rust-brotli) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.7 Step #3 - "compile-libfuzzer-address-x86_64": warning: field `0` is never read Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/rust-brotli/src/enc/pdf.rs:5:16 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | pub struct PDF([i16;16]); Step #3 - "compile-libfuzzer-address-x86_64":  |  --- ^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  |  | Step #3 - "compile-libfuzzer-address-x86_64":  |  field in this struct Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `PDF` has derived impls for the traits `Debug` and `Clone`, but these are intentionally ignored during dead code analysis Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(dead_code)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: consider changing the field to be of unit type to suppress this warning while preserving the field numbering, or remove the field Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 5 | pub struct PDF(()); Step #3 - "compile-libfuzzer-address-x86_64":  | ~~ Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error: non-binding let on a synchronization lock Step #3 - "compile-libfuzzer-address-x86_64":  --> /src/rust-brotli/src/enc/worker_pool.rs:135:19 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 135 |  let _ = cvar.wait(local_queue); // unlock immediately, unfortunately Step #3 - "compile-libfuzzer-address-x86_64":  |  ^ this lock is not assigned to a binding and is immediately dropped Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[deny(let_underscore_lock)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": help: consider binding to an unused variable to avoid immediately dropping the value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 135 |  let _unused = cvar.wait(local_queue); // unlock immediately, unfortunately Step #3 - "compile-libfuzzer-address-x86_64":  | ~~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": help: consider immediately dropping the value Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 135 |  drop(cvar.wait(local_queue)); // unlock immediately, unfortunately Step #3 - "compile-libfuzzer-address-x86_64":  | ~~~~~ + Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `brotli` (lib) generated 1 warning Step #3 - "compile-libfuzzer-address-x86_64": error: could not compile `brotli` (lib) due to 1 previous error; 1 warning emitted Step #3 - "compile-libfuzzer-address-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-address-x86_64": Error: failed to build fuzz script: ASAN_OPTIONS="detect_odr_violation=0" RUSTFLAGS="-Cpasses=sancov-module -Cllvm-args=-sanitizer-coverage-level=4 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters -Cllvm-args=-sanitizer-coverage-pc-table -Cllvm-args=-sanitizer-coverage-trace-compares --cfg fuzzing -Clink-dead-code -Zsanitizer=address -Cllvm-args=-sanitizer-coverage-stack-depth -Cdebug-assertions -C codegen-units=1 --cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -Cdebug-assertions=yes" "cargo" "build" "--manifest-path" "/src/rust-brotli/fuzz/Cargo.toml" "--target" "x86_64-unknown-linux-gnu" "--release" "--config" "profile.release.debug=true" "--bins" Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image rust-brotli Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 rust-brotli Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1