starting build "21a8871c-1378-478c-9cfd-4dce2ea1a4be" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632" Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Sending build context to Docker daemon 5.12kB Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": latest: Pulling from oss-fuzz-base/base-builder-rust Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": b549f31133a9: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": fc957eac73fe: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2cf09256a281: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ec6a8dc609c2: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 7a0edb5b7d4e: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a3abd53f2343: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 381f9842cba9: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2556f961ed7c: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f32f0bf109f8: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3080c398ec43: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f925d4306557: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a8e77bfec825: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e14ebaf3b579: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f0ce92c57085: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 30f51561ae4d: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2e37b36c08ab: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5b466370ec87: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 96ae8a14006f: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5959649fcaa1: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a373a10f34e4: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 953f85270c93: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0b088d536e47: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2f69140d5d56: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0acd5848d8c2: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 39850466351c: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d218b0d7a99: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3ffa2e7dd461: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 82566085f0f7: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d96a5a2dfa0: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f15fd50e6658: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 460f78ffa67c: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e751bf5e03f1: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 05b5544b2c30: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 6ac81511fee6: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3de7f2e6012d: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 8b375fb0f308: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 36147e1ccd32: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": bb0c9987d4fa: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a1196840b7e7: Pulling fs layer Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 381f9842cba9: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a373a10f34e4: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2556f961ed7c: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 460f78ffa67c: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f32f0bf109f8: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3080c398ec43: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 953f85270c93: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f925d4306557: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0b088d536e47: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a8e77bfec825: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2f69140d5d56: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a1196840b7e7: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0acd5848d8c2: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e14ebaf3b579: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 8b375fb0f308: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 39850466351c: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f0ce92c57085: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d218b0d7a99: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 36147e1ccd32: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 30f51561ae4d: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3ffa2e7dd461: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 82566085f0f7: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2e37b36c08ab: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d96a5a2dfa0: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f15fd50e6658: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 96ae8a14006f: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e751bf5e03f1: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 05b5544b2c30: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 6ac81511fee6: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3de7f2e6012d: Waiting Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 7a0edb5b7d4e: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2cf09256a281: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2cf09256a281: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 381f9842cba9: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2556f961ed7c: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2556f961ed7c: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": b549f31133a9: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": b549f31133a9: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ec6a8dc609c2: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ec6a8dc609c2: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f925d4306557: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f925d4306557: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a8e77bfec825: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a8e77bfec825: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e14ebaf3b579: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e14ebaf3b579: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f0ce92c57085: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f0ce92c57085: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2e37b36c08ab: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 30f51561ae4d: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 30f51561ae4d: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": fc957eac73fe: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": fc957eac73fe: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3080c398ec43: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3080c398ec43: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 96ae8a14006f: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 96ae8a14006f: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5b466370ec87: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5b466370ec87: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5959649fcaa1: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5959649fcaa1: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a373a10f34e4: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a373a10f34e4: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 953f85270c93: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 953f85270c93: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0b088d536e47: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2f69140d5d56: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2f69140d5d56: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0acd5848d8c2: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0acd5848d8c2: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 39850466351c: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 39850466351c: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d218b0d7a99: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d218b0d7a99: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3ffa2e7dd461: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 82566085f0f7: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 82566085f0f7: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d96a5a2dfa0: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d96a5a2dfa0: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 460f78ffa67c: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": b549f31133a9: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f15fd50e6658: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f15fd50e6658: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e751bf5e03f1: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 05b5544b2c30: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 05b5544b2c30: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 6ac81511fee6: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 6ac81511fee6: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 8b375fb0f308: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 8b375fb0f308: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3de7f2e6012d: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3de7f2e6012d: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f32f0bf109f8: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f32f0bf109f8: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 36147e1ccd32: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 36147e1ccd32: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": bb0c9987d4fa: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": bb0c9987d4fa: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a3abd53f2343: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a3abd53f2343: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a1196840b7e7: Verifying Checksum Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a1196840b7e7: Download complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": fc957eac73fe: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2cf09256a281: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ec6a8dc609c2: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 7a0edb5b7d4e: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a3abd53f2343: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 381f9842cba9: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2556f961ed7c: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f32f0bf109f8: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3080c398ec43: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f925d4306557: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a8e77bfec825: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e14ebaf3b579: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f0ce92c57085: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 30f51561ae4d: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2e37b36c08ab: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5b466370ec87: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 96ae8a14006f: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 5959649fcaa1: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a373a10f34e4: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 953f85270c93: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0b088d536e47: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2f69140d5d56: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 0acd5848d8c2: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 39850466351c: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d218b0d7a99: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3ffa2e7dd461: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 82566085f0f7: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 2d96a5a2dfa0: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": f15fd50e6658: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 460f78ffa67c: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": e751bf5e03f1: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 05b5544b2c30: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 6ac81511fee6: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 3de7f2e6012d: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 8b375fb0f308: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": 36147e1ccd32: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": bb0c9987d4fa: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": a1196840b7e7: Pull complete Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Digest: sha256:d15bc056ce2ab273d91c3808e74af53e8bd115f32ec69ba9af3684e94560328a Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> b151a73ad793 Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Step 2/4 : RUN git clone --depth 1 https://github.com/dtolnay/serde-yaml serde-yaml Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> Running in 7a07ef87c05d Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Cloning into 'serde-yaml'... Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Removing intermediate container 7a07ef87c05d Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> 5f2579a7a75d Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Step 3/4 : WORKDIR $SRC Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> Running in a39d905bbe72 Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Removing intermediate container a39d905bbe72 Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> efd8e74217f1 Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Step 4/4 : COPY build.sh $SRC/ Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": ---> 0c56b1cd40bd Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Successfully built 0c56b1cd40bd Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Successfully tagged gcr.io/oss-fuzz/serde-yaml:latest Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/serde-yaml:latest Finished Step #1 - "build-b35beb2b-aad1-4ddc-972b-1afc0c1bb632" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/serde-yaml Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileKBLFsO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/serde-yaml/.git Step #2 - "srcmap": + GIT_DIR=/src/serde-yaml Step #2 - "srcmap": + cd /src/serde-yaml Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dtolnay/serde-yaml Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2009506d33767dfc88e979d6bc0d53d09f941c94 Step #2 - "srcmap": + jq_inplace /tmp/fileKBLFsO '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileR3chD9 Step #2 - "srcmap": + cat /tmp/fileKBLFsO Step #2 - "srcmap": + jq '."/src/serde-yaml" = { type: "git", url: "https://github.com/dtolnay/serde-yaml", rev: "2009506d33767dfc88e979d6bc0d53d09f941c94" }' Step #2 - "srcmap": + mv /tmp/fileR3chD9 /tmp/fileKBLFsO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileKBLFsO Step #2 - "srcmap": + rm /tmp/fileKBLFsO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/serde-yaml": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dtolnay/serde-yaml", Step #2 - "srcmap": "rev": "2009506d33767dfc88e979d6bc0d53d09f941c94" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/serde-yaml Step #3 - "compile-libfuzzer-coverage-x86_64": + cargo fuzz build -O Step #3 - "compile-libfuzzer-coverage-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-coverage-x86_64":  Locking 26 packages to latest compatible versions Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded itoa v1.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded equivalent v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded indexmap v2.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded jobserver v0.1.34 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded find-msvc-tools v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded arbitrary v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde_core v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded serde v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded hashbrown v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded cc v1.2.54 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded ryu v1.0.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Downloaded libc v0.2.180 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libc v0.2.180 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling find-msvc-tools v0.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_core v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde v1.0.228 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling hashbrown v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling equivalent v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling itoa v1.0.17 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling ryu v1.0.22 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling unsafe-libyaml v0.2.11 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling arbitrary v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling indexmap v2.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling jobserver v0.1.34 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling cc v1.2.54 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling libfuzzer-sys v0.4.10 Step #3 - "compile-libfuzzer-coverage-x86_64":  Compiling serde_yaml v0.9.34+deprecated (/src/serde-yaml) Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:21:28 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 21 |  kind: unsafe { (*parser).error }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[deny(dangerous_implicit_autorefs)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 21 |  kind: unsafe { (&(*parser)).error }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:22:50 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 22 |  problem: match NonNull::new(unsafe { (*parser).problem as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 22 |  problem: match NonNull::new(unsafe { (&(*parser)).problem as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:26:38 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 26 |  problem_offset: unsafe { (*parser).problem_offset }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 26 |  problem_offset: unsafe { (&(*parser)).problem_offset }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:28:31 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 28 |  sys: unsafe { (*parser).problem_mark }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 28 |  sys: unsafe { (&(*parser)).problem_mark }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:30:50 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 30 |  context: match NonNull::new(unsafe { (*parser).context as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 30 |  context: match NonNull::new(unsafe { (&(*parser)).context as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:35:31 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 35 |  sys: unsafe { (*parser).context_mark }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 35 |  sys: unsafe { (&(*parser)).context_mark }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:42:28 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 42 |  kind: unsafe { (*emitter).error }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^-------^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_emitter_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 42 |  kind: unsafe { (&(*emitter)).error }, Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/error.rs:43:50 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 43 |  problem: match NonNull::new(unsafe { (*emitter).problem as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^-------^^^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*const yaml_emitter_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 43 |  problem: match NonNull::new(unsafe { (&(*emitter)).problem as *mut _ }) { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: implicit autoref creates a reference to the dereference of a raw pointer Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/libyaml/parser.rs:87:16 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 87 |  if (*parser).error != sys::YAML_NO_ERROR { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^------^^^^^^^ Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | this raw pointer has type `*mut yaml_parser_t` Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: creating a reference requires the pointer target to be valid and imposes aliasing requirements Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: references are created through calls to explicit `Deref(Mut)::deref(_mut)` implementations Step #3 - "compile-libfuzzer-coverage-x86_64": help: try using a raw pointer method instead; or if this reference is intentional, make it explicit Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 87 |  if (&(*parser)).error != sys::YAML_NO_ERROR { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++ + Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:81:18 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 81 |  pub fn entry(&mut self, k: Value) -> Entry { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^ ^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  = note: `#[warn(mismatched_lifetime_syntaxes)]` on by default Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 81 |  pub fn entry(&mut self, k: Value) -> Entry<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:188:17 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 188 |  pub fn iter(&self) -> Iter { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^ ^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 188 |  pub fn iter(&self) -> Iter<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:197:21 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 197 |  pub fn iter_mut(&mut self) -> IterMut { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^ ^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 197 |  pub fn iter_mut(&mut self) -> IterMut<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:204:17 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 204 |  pub fn keys(&self) -> Keys { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^ ^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 204 |  pub fn keys(&self) -> Keys<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:218:19 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 218 |  pub fn values(&self) -> Values { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^ ^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 218 |  pub fn values(&self) -> Values<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/mapping.rs:225:23 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 225 |  pub fn values_mut(&mut self) -> ValuesMut { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^^^ ^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 225 |  pub fn values_mut(&mut self) -> ValuesMut<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/number.rs:555:34 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 555 | pub(crate) fn unexpected(number: &Number) -> Unexpected { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^^^ ^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 555 | pub(crate) fn unexpected(number: &Number) -> Unexpected<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: hiding a lifetime that's elided elsewhere is confusing Step #3 - "compile-libfuzzer-coverage-x86_64":  --> /src/serde-yaml/src/value/de.rs:1231:30 Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 1231 |  pub(crate) fn unexpected(&self) -> Unexpected { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ^^^^^ ^^^^^^^^^^ the same lifetime is hidden here Step #3 - "compile-libfuzzer-coverage-x86_64":  | | Step #3 - "compile-libfuzzer-coverage-x86_64":  | the lifetime is elided here Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64":  = help: the same lifetime is referred to in inconsistent ways, making the signature confusing Step #3 - "compile-libfuzzer-coverage-x86_64": help: use `'_` for type paths Step #3 - "compile-libfuzzer-coverage-x86_64":  | Step #3 - "compile-libfuzzer-coverage-x86_64": 1231 |  pub(crate) fn unexpected(&self) -> Unexpected<'_> { Step #3 - "compile-libfuzzer-coverage-x86_64":  | ++++ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": warning: `serde_yaml` (lib) generated 8 warnings Step #3 - "compile-libfuzzer-coverage-x86_64": error: could not compile `serde_yaml` (lib) due to 9 previous errors; 8 warnings emitted Step #3 - "compile-libfuzzer-coverage-x86_64": ********************************************************************************\nFailed to build.\nTo reproduce, run:\npython infra/helper.py build_image serde-yaml\npython infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 serde-yaml\n******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1