starting build "f26d4274-a23b-4e61-8592-a7487b0c5207" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 89d02f7aa105: Pulling fs layer Step #1: 8ddf7f2f1afd: Pulling fs layer Step #1: 953d024f972e: Pulling fs layer Step #1: 73e4c1a95d7c: Pulling fs layer Step #1: 020e2a8ae453: Pulling fs layer Step #1: 2acedd8e811d: Pulling fs layer Step #1: 802a6d21accc: Pulling fs layer Step #1: d43675a77318: Pulling fs layer Step #1: 6b73abbe7e10: Pulling fs layer Step #1: d4b1706c862d: Pulling fs layer Step #1: 4048c2589592: Pulling fs layer Step #1: 12ad58c9f342: Pulling fs layer Step #1: dee138f71a27: Pulling fs layer Step #1: 72540e57f36d: Pulling fs layer Step #1: 7e8d67df18fb: Pulling fs layer Step #1: 825049a9716f: Pulling fs layer Step #1: c54231abef85: Pulling fs layer Step #1: 3ade40efbbb6: Pulling fs layer Step #1: 1ad21c5cbdd1: Pulling fs layer Step #1: fc0edc2d2b23: Pulling fs layer Step #1: 00ada1e933ba: Pulling fs layer Step #1: 543b6d759c6d: Pulling fs layer Step #1: 46c7309e1ad1: Pulling fs layer Step #1: 66229b962aa0: Pulling fs layer Step #1: 8617b294b338: Pulling fs layer Step #1: 97a033adfc50: Pulling fs layer Step #1: 606b27214ffd: Pulling fs layer Step #1: 4048c2589592: Waiting Step #1: 768c386681d6: Pulling fs layer Step #1: acbe71f55854: Pulling fs layer Step #1: 12ad58c9f342: Waiting Step #1: 8ce76d92792e: Pulling fs layer Step #1: 411da31e4e7a: Pulling fs layer Step #1: 953d024f972e: Waiting Step #1: dee138f71a27: Waiting Step #1: 73e4c1a95d7c: Waiting Step #1: 72540e57f36d: Waiting Step #1: 543b6d759c6d: Waiting Step #1: 63bd8a02ea72: Pulling fs layer Step #1: 7e8d67df18fb: Waiting Step #1: 020e2a8ae453: Waiting Step #1: 46c7309e1ad1: Waiting Step #1: 29e671cfdcfa: Pulling fs layer Step #1: b3b143dff85b: Pulling fs layer Step #1: 8617b294b338: Waiting Step #1: 802a6d21accc: Waiting Step #1: d4b1706c862d: Waiting Step #1: 825049a9716f: Waiting Step #1: 1ad21c5cbdd1: Waiting Step #1: c54231abef85: Waiting Step #1: fc0edc2d2b23: Waiting Step #1: 3ade40efbbb6: Waiting Step #1: 768c386681d6: Waiting Step #1: 00ada1e933ba: Waiting Step #1: d43675a77318: Waiting Step #1: 29e671cfdcfa: Waiting Step #1: b3b143dff85b: Waiting Step #1: 2acedd8e811d: Waiting Step #1: 6b73abbe7e10: Waiting Step #1: 606b27214ffd: Waiting Step #1: acbe71f55854: Waiting Step #1: 411da31e4e7a: Waiting Step #1: 8ddf7f2f1afd: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 73e4c1a95d7c: Verifying Checksum Step #1: 73e4c1a95d7c: Download complete Step #1: 953d024f972e: Verifying Checksum Step #1: 953d024f972e: Download complete Step #1: 020e2a8ae453: Verifying Checksum Step #1: 020e2a8ae453: Download complete Step #1: 89d02f7aa105: Verifying Checksum Step #1: 89d02f7aa105: Download complete Step #1: 802a6d21accc: Verifying Checksum Step #1: 802a6d21accc: Download complete Step #1: d43675a77318: Verifying Checksum Step #1: d43675a77318: Download complete Step #1: b549f31133a9: Pull complete Step #1: d4b1706c862d: Verifying Checksum Step #1: d4b1706c862d: Download complete Step #1: 4048c2589592: Verifying Checksum Step #1: 4048c2589592: Download complete Step #1: 12ad58c9f342: Verifying Checksum Step #1: 12ad58c9f342: Download complete Step #1: dee138f71a27: Verifying Checksum Step #1: dee138f71a27: Download complete Step #1: 72540e57f36d: Verifying Checksum Step #1: 72540e57f36d: Download complete Step #1: 7e8d67df18fb: Verifying Checksum Step #1: 7e8d67df18fb: Download complete Step #1: 825049a9716f: Verifying Checksum Step #1: 825049a9716f: Download complete Step #1: 6b73abbe7e10: Verifying Checksum Step #1: 6b73abbe7e10: Download complete Step #1: c54231abef85: Verifying Checksum Step #1: c54231abef85: Download complete Step #1: 3ade40efbbb6: Verifying Checksum Step #1: 3ade40efbbb6: Download complete Step #1: 1ad21c5cbdd1: Verifying Checksum Step #1: 1ad21c5cbdd1: Download complete Step #1: fc0edc2d2b23: Verifying Checksum Step #1: fc0edc2d2b23: Download complete Step #1: 2acedd8e811d: Verifying Checksum Step #1: 2acedd8e811d: Download complete Step #1: 00ada1e933ba: Verifying Checksum Step #1: 00ada1e933ba: Download complete Step #1: 543b6d759c6d: Verifying Checksum Step #1: 543b6d759c6d: Download complete Step #1: 46c7309e1ad1: Download complete Step #1: 66229b962aa0: Download complete Step #1: 8617b294b338: Verifying Checksum Step #1: 8617b294b338: Download complete Step #1: 606b27214ffd: Verifying Checksum Step #1: 606b27214ffd: Download complete Step #1: 768c386681d6: Verifying Checksum Step #1: 768c386681d6: Download complete Step #1: 97a033adfc50: Verifying Checksum Step #1: 97a033adfc50: Download complete Step #1: 8ce76d92792e: Verifying Checksum Step #1: 8ce76d92792e: Download complete Step #1: acbe71f55854: Verifying Checksum Step #1: acbe71f55854: Download complete Step #1: 411da31e4e7a: Download complete Step #1: 89d02f7aa105: Pull complete Step #1: 29e671cfdcfa: Verifying Checksum Step #1: 29e671cfdcfa: Download complete Step #1: 8ddf7f2f1afd: Pull complete Step #1: 953d024f972e: Pull complete Step #1: 73e4c1a95d7c: Pull complete Step #1: 020e2a8ae453: Pull complete Step #1: b3b143dff85b: Verifying Checksum Step #1: b3b143dff85b: Download complete Step #1: 2acedd8e811d: Pull complete Step #1: 802a6d21accc: Pull complete Step #1: d43675a77318: Pull complete Step #1: 6b73abbe7e10: Pull complete Step #1: d4b1706c862d: Pull complete Step #1: 4048c2589592: Pull complete Step #1: 12ad58c9f342: Pull complete Step #1: dee138f71a27: Pull complete Step #1: 72540e57f36d: Pull complete Step #1: 7e8d67df18fb: Pull complete Step #1: 825049a9716f: Pull complete Step #1: c54231abef85: Pull complete Step #1: 3ade40efbbb6: Pull complete Step #1: 1ad21c5cbdd1: Pull complete Step #1: fc0edc2d2b23: Pull complete Step #1: 00ada1e933ba: Pull complete Step #1: 543b6d759c6d: Pull complete Step #1: 46c7309e1ad1: Pull complete Step #1: 66229b962aa0: Pull complete Step #1: 8617b294b338: Pull complete Step #1: 97a033adfc50: Pull complete Step #1: 606b27214ffd: Pull complete Step #1: 768c386681d6: Pull complete Step #1: acbe71f55854: Pull complete Step #1: 8ce76d92792e: Pull complete Step #1: 411da31e4e7a: Pull complete Step #1: 63bd8a02ea72: Pull complete Step #1: 29e671cfdcfa: Pull complete Step #1: b3b143dff85b: Pull complete Step #1: Digest: sha256:f6d960593851c96a15b0f07fc0b728a7b83b30aff9d4651eabbae6ee2650979e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> e9aba955b8ba Step #1: Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1: ---> Running in 37e38f783a9a Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (249 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 Step #1: m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1: | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev file libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libsigsegv2 libtool m4 Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1774 kB of archives. Step #1: After this operation, 12.8 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 1774 kB in 1s (1418 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../03-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../04-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../05-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../06-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../07-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../08-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../09-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../10-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 37e38f783a9a Step #1: ---> 94afb4e2222c Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/Frommi/miniz_oxide miniz_oxide Step #1: ---> Running in c11d9cd7513d Step #1: Cloning into 'miniz_oxide'... Step #1: Removing intermediate container c11d9cd7513d Step #1: ---> 7584c1900d23 Step #1: Step 4/5 : WORKDIR miniz_oxide Step #1: ---> Running in 5b48d7e6c438 Step #1: Removing intermediate container 5b48d7e6c438 Step #1: ---> aba33e49ab1c Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> d75292470004 Step #1: Successfully built d75292470004 Step #1: Successfully tagged gcr.io/oss-fuzz/miniz_oxide:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/miniz_oxide Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file6SVaoO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/miniz_oxide/.git Step #2 - "srcmap": + GIT_DIR=/src/miniz_oxide Step #2 - "srcmap": + cd /src/miniz_oxide Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/Frommi/miniz_oxide Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1f829d2574a7842f4d5e5a3ff9c33f249451f79f Step #2 - "srcmap": + jq_inplace /tmp/file6SVaoO '."/src/miniz_oxide" = { type: "git", url: "https://github.com/Frommi/miniz_oxide", rev: "1f829d2574a7842f4d5e5a3ff9c33f249451f79f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filezBjeyd Step #2 - "srcmap": + cat /tmp/file6SVaoO Step #2 - "srcmap": + jq '."/src/miniz_oxide" = { type: "git", url: "https://github.com/Frommi/miniz_oxide", rev: "1f829d2574a7842f4d5e5a3ff9c33f249451f79f" }' Step #2 - "srcmap": + mv /tmp/filezBjeyd /tmp/file6SVaoO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file6SVaoO Step #2 - "srcmap": + rm /tmp/file6SVaoO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/miniz_oxide": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/Frommi/miniz_oxide", Step #2 - "srcmap": "rev": "1f829d2574a7842f4d5e5a3ff9c33f249451f79f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + ./build_orig_miniz.sh Step #3 - "compile-libfuzzer-address-x86_64": rm: cannot remove 'bin/libminiz.a': No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": miniz/miniz.c:3089:9: note: #pragma message: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. Step #3 - "compile-libfuzzer-address-x86_64": 3089 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": | ^~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": miniz_stub/miniz_zip.c:133:9: note: #pragma message: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. Step #3 - "compile-libfuzzer-address-x86_64": 133 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": | ^~~~~~~ Step #3 - "compile-libfuzzer-address-x86_64": + RUSTFLAGS='--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -L./bin/' Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-address-x86_64": warning: /src/miniz_oxide/fuzz/Cargo.toml: no edition set: defaulting to the 2015 edition while the latest is 2021 Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 12 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded adler2 v2.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded crc32fast v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling adler2 v2.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cfg-if v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling crc32fast v1.4.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide v0.8.2 (/src/miniz_oxide/miniz_oxide) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide_c_api v0.3.1 (/src/miniz_oxide) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.8 Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: miniz/miniz.c:3089:9: warning: Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files. [-W#pragma-messages] Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: 3089 | #pragma message("Using fopen, ftello, fseeko, stat() etc. path for file I/O - this path may not support large files.") Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: | ^ Step #3 - "compile-libfuzzer-address-x86_64": warning: miniz_oxide_c_api@0.3.1: 1 warning generated. Step #3 - "compile-libfuzzer-address-x86_64":  Compiling miniz_oxide_c_api-fuzz v0.0.1 (/src/miniz_oxide/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:7:1 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 7 | extern crate libc; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:9:5 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 9 | use libc::*; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:25:40 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 25 |  let uncompressed_size = s.len() as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:29:50 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let mut rust_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:29:35 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 29 |  let mut rust_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:31:52 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 |  let mut rust_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:31:37 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 31 |  let mut rust_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:34:47 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let mut c_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:34:32 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 34 |  let mut c_compressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:36:49 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let mut c_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:36:34 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 36 |  let mut c_decompressed_size: c_ulong = N as c_ulong; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:13:41 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 13 |  dest_len: *mut c_ulong, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:15:38 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 |  source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:15:50 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 15 |  source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:17:43 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 | ... dest_len: *mut c_ulong, Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:19:40 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | ... source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": error[E0658]: use of unstable library feature 'rustc_private': this crate is being loaded from the sysroot, an unstable location; did you mean to load this crate from crates.io via `Cargo.toml` instead? Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/fuzz_high.rs:19:52 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 19 | ... source_len: c_ulong) -> c_int; Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = note: see issue #27812 for more information Step #3 - "compile-libfuzzer-address-x86_64":  = help: add `#![feature(rustc_private)]` to the crate attributes to enable Step #3 - "compile-libfuzzer-address-x86_64":  = note: this compiler was built on 2024-07-11; consider upgrading it if it is out of date Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": For more information about this error, try `rustc --explain E0658`. Step #3 - "compile-libfuzzer-address-x86_64": error: could not compile `miniz_oxide_c_api-fuzz` (bin "fuzz_high") due to 17 previous errors Step #3 - "compile-libfuzzer-address-x86_64": warning: build failed, waiting for other jobs to finish... Step #3 - "compile-libfuzzer-address-x86_64": Error: failed to build fuzz script: ASAN_OPTIONS="detect_odr_violation=0" RUSTFLAGS="-Cpasses=sancov-module -Cllvm-args=-sanitizer-coverage-level=4 -Cllvm-args=-sanitizer-coverage-inline-8bit-counters -Cllvm-args=-sanitizer-coverage-pc-table -Cllvm-args=-sanitizer-coverage-trace-compares --cfg fuzzing -Clink-dead-code -Zsanitizer=address -Cllvm-args=-sanitizer-coverage-stack-depth -C codegen-units=1 --cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers -L./bin/" "cargo" "build" "--manifest-path" "/src/miniz_oxide/fuzz/Cargo.toml" "--target" "x86_64-unknown-linux-gnu" "--release" "--config" "profile.release.debug=true" "--bins" Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image miniz_oxide Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 miniz_oxide Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1