starting build "08213f39-cfb9-4c4d-aa6d-32e9ea68b70b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 16.9kB Step #1: Step 1/11 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 800687449569: Pulling fs layer Step #1: 67cc84ed39bf: Pulling fs layer Step #1: 33c4464df317: Pulling fs layer Step #1: 7a3d59ffed63: Pulling fs layer Step #1: bc24bccd8f7c: Pulling fs layer Step #1: 18d20619fb8d: Pulling fs layer Step #1: 0ec212d79142: Pulling fs layer Step #1: 0d731e844f5b: Pulling fs layer Step #1: 03e6d4298870: Pulling fs layer Step #1: 9cb6c9480ffe: Pulling fs layer Step #1: 636367483a85: Pulling fs layer Step #1: ab160a08f40f: Pulling fs layer Step #1: d56fb1501120: Pulling fs layer Step #1: 6e5ee80d4b76: Pulling fs layer Step #1: 069b70ca1828: Pulling fs layer Step #1: 082a5c4ba783: Pulling fs layer Step #1: aeb889ce9374: Pulling fs layer Step #1: b3c77a307741: Pulling fs layer Step #1: 19afa95abd0d: Pulling fs layer Step #1: 3331bfca5447: Pulling fs layer Step #1: ca89507fe8d3: Pulling fs layer Step #1: 093d0a8d4813: Pulling fs layer Step #1: 562130e5e1f0: Pulling fs layer Step #1: 18d20619fb8d: Waiting Step #1: c78d65770fdc: Pulling fs layer Step #1: d8a48a39f3bb: Pulling fs layer Step #1: d547270a8392: Pulling fs layer Step #1: 0ec212d79142: Waiting Step #1: cd72b15f7674: Pulling fs layer Step #1: 0d731e844f5b: Waiting Step #1: fed123fa2f8a: Pulling fs layer Step #1: 03e6d4298870: Waiting Step #1: 39a8609a58c5: Pulling fs layer Step #1: 9cb6c9480ffe: Waiting Step #1: 636367483a85: Waiting Step #1: ab160a08f40f: Waiting Step #1: d56fb1501120: Waiting Step #1: 7a3d59ffed63: Waiting Step #1: 6e5ee80d4b76: Waiting Step #1: 069b70ca1828: Waiting Step #1: 082a5c4ba783: Waiting Step #1: aeb889ce9374: Waiting Step #1: b3c77a307741: Waiting Step #1: fed123fa2f8a: Waiting Step #1: 19afa95abd0d: Waiting Step #1: 3331bfca5447: Waiting Step #1: bc24bccd8f7c: Waiting Step #1: d8a48a39f3bb: Waiting Step #1: 39a8609a58c5: Waiting Step #1: 33c4464df317: Waiting Step #1: ca89507fe8d3: Waiting Step #1: 562130e5e1f0: Waiting Step #1: cd72b15f7674: Waiting Step #1: c78d65770fdc: Waiting Step #1: 67cc84ed39bf: Verifying Checksum Step #1: 67cc84ed39bf: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 7a3d59ffed63: Download complete Step #1: bc24bccd8f7c: Verifying Checksum Step #1: bc24bccd8f7c: Download complete Step #1: 33c4464df317: Verifying Checksum Step #1: 33c4464df317: Download complete Step #1: 0ec212d79142: Verifying Checksum Step #1: 0ec212d79142: Download complete Step #1: 0d731e844f5b: Verifying Checksum Step #1: 0d731e844f5b: Download complete Step #1: 800687449569: Verifying Checksum Step #1: 800687449569: Download complete Step #1: 9cb6c9480ffe: Verifying Checksum Step #1: 9cb6c9480ffe: Download complete Step #1: 636367483a85: Verifying Checksum Step #1: 636367483a85: Download complete Step #1: ab160a08f40f: Verifying Checksum Step #1: ab160a08f40f: Download complete Step #1: b549f31133a9: Pull complete Step #1: d56fb1501120: Verifying Checksum Step #1: d56fb1501120: Download complete Step #1: 6e5ee80d4b76: Verifying Checksum Step #1: 6e5ee80d4b76: Download complete Step #1: 069b70ca1828: Verifying Checksum Step #1: 069b70ca1828: Download complete Step #1: 082a5c4ba783: Verifying Checksum Step #1: 082a5c4ba783: Download complete Step #1: aeb889ce9374: Verifying Checksum Step #1: aeb889ce9374: Download complete Step #1: b3c77a307741: Verifying Checksum Step #1: b3c77a307741: Download complete Step #1: 03e6d4298870: Verifying Checksum Step #1: 03e6d4298870: Download complete Step #1: 19afa95abd0d: Verifying Checksum Step #1: 19afa95abd0d: Download complete Step #1: 3331bfca5447: Download complete Step #1: ca89507fe8d3: Verifying Checksum Step #1: ca89507fe8d3: Download complete Step #1: 093d0a8d4813: Verifying Checksum Step #1: 093d0a8d4813: Download complete Step #1: 562130e5e1f0: Download complete Step #1: c78d65770fdc: Verifying Checksum Step #1: c78d65770fdc: Download complete Step #1: d8a48a39f3bb: Verifying Checksum Step #1: d8a48a39f3bb: Download complete Step #1: cd72b15f7674: Verifying Checksum Step #1: cd72b15f7674: Download complete Step #1: d547270a8392: Download complete Step #1: fed123fa2f8a: Verifying Checksum Step #1: fed123fa2f8a: Download complete Step #1: 39a8609a58c5: Download complete Step #1: 800687449569: Pull complete Step #1: 67cc84ed39bf: Pull complete Step #1: 18d20619fb8d: Verifying Checksum Step #1: 18d20619fb8d: Download complete Step #1: 33c4464df317: Pull complete Step #1: 7a3d59ffed63: Pull complete Step #1: bc24bccd8f7c: Pull complete Step #1: 18d20619fb8d: Pull complete Step #1: 0ec212d79142: Pull complete Step #1: 0d731e844f5b: Pull complete Step #1: 03e6d4298870: Pull complete Step #1: 9cb6c9480ffe: Pull complete Step #1: 636367483a85: Pull complete Step #1: ab160a08f40f: Pull complete Step #1: d56fb1501120: Pull complete Step #1: 6e5ee80d4b76: Pull complete Step #1: 069b70ca1828: Pull complete Step #1: 082a5c4ba783: Pull complete Step #1: aeb889ce9374: Pull complete Step #1: b3c77a307741: Pull complete Step #1: 19afa95abd0d: Pull complete Step #1: 3331bfca5447: Pull complete Step #1: ca89507fe8d3: Pull complete Step #1: 093d0a8d4813: Pull complete Step #1: 562130e5e1f0: Pull complete Step #1: c78d65770fdc: Pull complete Step #1: d8a48a39f3bb: Pull complete Step #1: d547270a8392: Pull complete Step #1: cd72b15f7674: Pull complete Step #1: fed123fa2f8a: Pull complete Step #1: 39a8609a58c5: Pull complete Step #1: Digest: sha256:e8550ff2b57077cb14770e2ec5a77bdcd040c602412df65fe7355825f55ed250 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> d548bd1f3608 Step #1: Step 2/11 : RUN apt-get update && apt-get install -y --no-install-recommends curl rsync && apt-get clean && rm -rf /var/lib/apt/lists/* Step #1: ---> Running in 804f1af0e92f Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 0s (233 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: curl is already the newest version (7.68.0-1ubuntu2.20). Step #1: rsync is already the newest version (3.1.3-8ubuntu0.7). Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container 804f1af0e92f Step #1: ---> ed6fa74181b0 Step #1: Step 3/11 : RUN python3 -m pip install numpy Step #1: ---> Running in 99a1bd1bc438 Step #1: Collecting numpy Step #1: Downloading https://files.pythonhosted.org/packages/a4/9b/027bec52c633f6556dba6b722d9a0befb40498b9ceddd29cbe67a45a127c/numpy-1.24.4.tar.gz (10.9MB) Step #1: Installing build dependencies: started Step #1: Installing build dependencies: finished with status 'done' Step #1: Getting requirements to build wheel: started Step #1: Getting requirements to build wheel: finished with status 'done' Step #1: Preparing wheel metadata: started Step #1: Preparing wheel metadata: finished with status 'done' Step #1: Building wheels for collected packages: numpy Step #1: Building wheel for numpy (PEP 517): started Step #1: Building wheel for numpy (PEP 517): still running... Step #1: Building wheel for numpy (PEP 517): finished with status 'done' Step #1: Created wheel for numpy: filename=numpy-1.24.4-cp38-cp38-linux_x86_64.whl size=9719853 sha256=f954fbfb63096e6a4a29620f5d6de7190c9105d5467a2bbb10aef127312dcf2f Step #1: Stored in directory: /root/.cache/pip/wheels/9f/b7/f4/38166ec6c7757984ef41e3f6594015395049bff59851c060ae Step #1: Successfully built numpy Step #1: Installing collected packages: numpy Step #1: Successfully installed numpy-1.24.4 Step #1: WARNING: You are using pip version 19.2.3, however version 23.3.1 is available. Step #1: You should consider upgrading via the 'pip install --upgrade pip' command. Step #1: Removing intermediate container 99a1bd1bc438 Step #1: ---> 8ac9241b905a Step #1: Step 4/11 : RUN ln -s /usr/local/bin/python3 /usr/local/bin/python Step #1: ---> Running in 05c9945c2154 Step #1: Removing intermediate container 05c9945c2154 Step #1: ---> d425ed886d66 Step #1: Step 5/11 : RUN curl -Lo /usr/bin/bazel https://github.com/bazelbuild/bazelisk/releases/download/v1.1.0/bazelisk-linux-amd64 && chmod +x /usr/bin/bazel Step #1: ---> Running in 30895203804a Step #1:  % Total % Received % Xferd Average Speed Time Time Time  Current Step #1: Dload Upload Total Spent Left Speed Step #1: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #1:  100 6036k 100 6036k 0 0 18.4M 0 --:--:-- --:--:-- --:--:-- 18.4M Step #1: Removing intermediate container 30895203804a Step #1: ---> 7e538a7b734e Step #1: Step 6/11 : ENV JAVA_HOME /usr/lib/jvm/java-15-openjdk-amd64 Step #1: ---> Running in 3a2365c518a7 Step #1: Removing intermediate container 3a2365c518a7 Step #1: ---> cf9007babe25 Step #1: Step 7/11 : RUN install_java.sh || true Step #1: ---> Running in 8633cc826acf Step #1: + cd /tmp Step #1: + curl --silent -L -O https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-x64_bin.tar.gz Step #1: + mkdir -p /usr/lib/jvm/java-15-openjdk-amd64 Step #1: + tar -xz --strip-components=1 -f openjdk-15.0.2_linux-x64_bin.tar.gz --directory /usr/lib/jvm/java-15-openjdk-amd64 Step #1: + rm -f openjdk-15.0.2_linux-x64_bin.tar.gz Step #1: + rm -rf /usr/lib/jvm/java-15-openjdk-amd64/jmods /usr/lib/jvm/java-15-openjdk-amd64/lib/src.zip Step #1: + cd /src/ Step #1: + git clone https://github.com/CodeIntelligenceTesting/jazzer Step #1: Cloning into 'jazzer'... Step #1: + cd jazzer Step #1: + git checkout b12d1ea863b336b120e192700ac11c9744af6cfd Step #1: Note: switching to 'b12d1ea863b336b120e192700ac11c9744af6cfd'. Step #1: Step #1: You are in 'detached HEAD' state. You can look around, make experimental Step #1: changes and commit them, and you can discard any commits you make in this Step #1: state without impacting any branches by switching back to a branch. Step #1: Step #1: If you want to create a new branch to retain commits you create, you may Step #1: do so (now or later) by using -c with the switch command. Example: Step #1: Step #1: git switch -c Step #1: Step #1: Or undo this operation with: Step #1: Step #1: git switch - Step #1: Step #1: Turn off this advice by setting config variable advice.detachedHead to false Step #1: Step #1: HEAD is now at b12d1ea8 deploy: Prepare release v0.17.1 Step #1: + cat Step #1: + bazel build //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar //deploy:jazzer-api //launcher:jazzer Step #1: 2023/12/01 06:57:43 Using unreleased version at commit 8482c7cf494686eb7498cec6ee58dad03b07ef0d Step #1: 2023/12/01 06:57:43 Downloading https://storage.googleapis.com/bazel-builds/artifacts/ubuntu1404/8482c7cf494686eb7498cec6ee58dad03b07ef0d/bazel... Step #1: Extracting Bazel installation... Step #1: Starting local Bazel server and connecting to it... Step #1: Loading: Step #1: Loading: Step #1: Loading: Step #1: Loading: Step #1: Loading: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: 3 targets (3 packages loaded, 0 targets configured) Step #1: Analyzing: 3 targets (58 packages loaded, 377 targets configured) Step #1: Analyzing: 3 targets (118 packages loaded, 730 targets configured) Step #1: Analyzing: 3 targets (140 packages loaded, 1368 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: Analyzing: 3 targets (144 packages loaded, 1692 targets configured) Step #1: INFO: Analyzed 3 targets (145 packages loaded, 1783 targets configured). Step #1: INFO: Found 3 targets... Step #1: [0 / 101] [Prepa] Creating source manifest for //src/main/java/com/code_intelligence/jazzer:jazzer_standalone ... (10 actions, 0 running) Step #1: [113 / 393] Compiling absl/numeric/int128.cc; 0s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [138 / 393] Compiling tools/cpp/runfiles/runfiles.cc; 2s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [181 / 395] Compiling absl/numeric/int128.cc; 1s processwrapper-sandbox ... (17 actions, 16 running) Step #1: [191 / 395] Compiling FuzzerDataFlowTrace.cpp; 2s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [202 / 395] Compiling FuzzerDataFlowTrace.cpp; 3s processwrapper-sandbox ... (32 actions, 28 running) Step #1: [214 / 395] Compiling FuzzerFork.cpp; 3s processwrapper-sandbox ... (32 actions, 27 running) Step #1: [227 / 395] Building external/rules_jvm_external/private/tools/java/com/github/bazelbuild/rules_jvm_external/librules_jvm_external.jar (4 source files) [for tool]; 3s multiplex-worker ... (31 actions, 17 running) Step #1: INFO: From Building external/com_github_jhalterman_typetools/libtypetools.jar (2 source files): Step #1: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:34: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #1: import java.security.AccessController; Step #1: ^ Step #1: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:68: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #1: final Unsafe unsafe = AccessController.doPrivileged(new PrivilegedExceptionAction() { Step #1: ^ Step #1: [258 / 395] Building external/com_github_johnynek_bazel_jar_jar/src/main/java/com/github/johnynek/jarjar/libjarjar-class.jar (45 source files) [for tool]; 4s multiplex-worker ... (25 actions, 21 running) Step #1: [302 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 4s worker ... (19 actions, 18 running) Step #1: [325 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 6s worker ... (10 actions, 8 running) Step #1: [335 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 7s worker ... (9 actions, 7 running) Step #1: [341 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 8s worker ... (7 actions, 6 running) Step #1: [346 / 395] KotlinCompile @//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 9s worker ... (5 actions running) Step #1: [356 / 395] KotlinCompile @//sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 11s worker ... (5 actions, 3 running) Step #1: [367 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 1s worker ... (2 actions running) Step #1: [368 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 2s worker ... (2 actions, 1 running) Step #1: [369 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 4s worker Step #1: [370 / 395] [Prepa] Compiling Java headers src/main/java/com/code_intelligence/jazzer/instrumentor/instrumentor-java-hjar.jar (1 source file) Step #1: [376 / 395] KotlinCompile @//src/main/java/com/code_intelligence/jazzer/agent:agent_lib { kt: 3, java: 1, srcjars: 0 } for k8; 0s worker ... (2 actions, 1 running) Step #1: [379 / 395] [Prepa] Building src/main/java/com/code_intelligence/jazzer/agent/agent_lib-java.jar (1 source file) Step #1: [386 / 395] [Prepa] Compiling Java headers src/main/java/com/code_intelligence/jazzer/driver/liboffline_instrumentor-hjar.jar (1 source file) Step #1: [390 / 395] [Prepa] Building src/main/java/com/code_intelligence/jazzer/libjazzer_lib.jar (1 source file) Step #1: [392 / 395] jarjar @//src/main/java/com/code_intelligence/jazzer:jazzer_shaded; 1s processwrapper-sandbox Step #1: [393 / 395] [Prepa] Action src/main/java/com/code_intelligence/jazzer/jazzer.jar Step #1: INFO: Elapsed time: 71.326s, Critical Path: 30.85s Step #1: INFO: 395 processes: 89 internal, 229 processwrapper-sandbox, 77 worker. Step #1: INFO: Build completed successfully, 395 total actions Step #1: ++ bazel cquery --output=files //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar Step #1: 2023/12/01 06:58:55 Using unreleased version at commit 8482c7cf494686eb7498cec6ee58dad03b07ef0d Step #1: Loading: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.220s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: + cp bazel-out/k8-opt/bin/src/main/java/com/code_intelligence/jazzer/jazzer_standalone_deploy.jar /usr/local/bin/jazzer_agent_deploy.jar Step #1: ++ bazel cquery --output=files //launcher:jazzer Step #1: 2023/12/01 06:58:55 Using unreleased version at commit 8482c7cf494686eb7498cec6ee58dad03b07ef0d Step #1: Loading: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //launcher:jazzer (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //launcher:jazzer (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.134s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: + cp bazel-out/k8-opt/bin/launcher/jazzer /usr/local/bin/jazzer_driver Step #1: ++ bazel cquery --output=files //deploy:jazzer-api Step #1: 2023/12/01 06:58:55 Using unreleased version at commit 8482c7cf494686eb7498cec6ee58dad03b07ef0d Step #1: Loading: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //deploy:jazzer-api (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //deploy:jazzer-api (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.111s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: /usr/local/bin/install_java.sh: line 41: JAZZER_API_PATH: unbound variable Step #1: Removing intermediate container 8633cc826acf Step #1: ---> d59c0ffaf7fb Step #1: Step 8/11 : RUN git clone --depth 1 https://github.com/tensorflow/tensorflow tensorflow Step #1: ---> Running in 6cfb25fbd29f Step #1: Cloning into 'tensorflow'... Step #1: Updating files: 58% (18064/31083) Updating files: 59% (18339/31083) Updating files: 60% (18650/31083) Updating files: 61% (18961/31083) Updating files: 62% (19272/31083) Updating files: 63% (19583/31083) Updating files: 64% (19894/31083) Updating files: 65% (20204/31083) Updating files: 66% (20515/31083) Updating files: 67% (20826/31083) Updating files: 68% (21137/31083) Updating files: 69% (21448/31083) Updating files: 70% (21759/31083) Updating files: 71% (22069/31083) Updating files: 72% (22380/31083) Updating files: 73% (22691/31083) Updating files: 74% (23002/31083) Updating files: 75% (23313/31083) Updating files: 76% (23624/31083) Updating files: 77% (23934/31083) Updating files: 78% (24245/31083) Updating files: 79% (24556/31083) Updating files: 80% (24867/31083) Updating files: 81% (25178/31083) Updating files: 82% (25489/31083) Updating files: 83% (25799/31083) Updating files: 84% (26110/31083) Updating files: 85% (26421/31083) Updating files: 86% (26732/31083) Updating files: 87% (27043/31083) Updating files: 88% (27354/31083) Updating files: 89% (27664/31083) Updating files: 90% (27975/31083) Updating files: 91% (28286/31083) Updating files: 92% (28597/31083) Updating files: 93% (28908/31083) Updating files: 94% (29219/31083) Updating files: 95% (29529/31083) Updating files: 96% (29840/31083) Updating files: 97% (30151/31083) Updating files: 98% (30462/31083) Updating files: 99% (30773/31083) Updating files: 100% (31083/31083) Updating files: 100% (31083/31083), done. Step #1: Removing intermediate container 6cfb25fbd29f Step #1: ---> af574fd69a27 Step #1: Step 9/11 : WORKDIR $SRC/tensorflow Step #1: ---> Running in a379b070bb1e Step #1: Removing intermediate container a379b070bb1e Step #1: ---> 4b0019ccb1e1 Step #1: Step 10/11 : COPY build.sh $SRC/ Step #1: ---> d029272a9984 Step #1: Step 11/11 : COPY *.patch $SRC/ Step #1: ---> 0d771f658cd8 Step #1: Successfully built 0d771f658cd8 Step #1: Successfully tagged gcr.io/oss-fuzz/tensorflow:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/tensorflow Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file08ElrP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/tensorflow/.git Step #2 - "srcmap": + GIT_DIR=/src/tensorflow Step #2 - "srcmap": + cd /src/tensorflow Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/tensorflow/tensorflow Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c810fe7b8ad63488e7e11b63c37030909f64f712 Step #2 - "srcmap": + jq_inplace /tmp/file08ElrP '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "c810fe7b8ad63488e7e11b63c37030909f64f712" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileK5ShEd Step #2 - "srcmap": + cat /tmp/file08ElrP Step #2 - "srcmap": + jq '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "c810fe7b8ad63488e7e11b63c37030909f64f712" }' Step #2 - "srcmap": + mv /tmp/fileK5ShEd /tmp/file08ElrP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/jazzer/.git Step #2 - "srcmap": + GIT_DIR=/src/jazzer Step #2 - "srcmap": + cd /src/jazzer Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/CodeIntelligenceTesting/jazzer Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=b12d1ea863b336b120e192700ac11c9744af6cfd Step #2 - "srcmap": + jq_inplace /tmp/file08ElrP '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "b12d1ea863b336b120e192700ac11c9744af6cfd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileoB5BJJ Step #2 - "srcmap": + cat /tmp/file08ElrP Step #2 - "srcmap": + jq '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "b12d1ea863b336b120e192700ac11c9744af6cfd" }' Step #2 - "srcmap": + mv /tmp/fileoB5BJJ /tmp/file08ElrP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file08ElrP Step #2 - "srcmap": + rm /tmp/file08ElrP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/tensorflow": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/tensorflow/tensorflow", Step #2 - "srcmap": "rev": "c810fe7b8ad63488e7e11b63c37030909f64f712" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/jazzer": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/CodeIntelligenceTesting/jazzer", Step #2 - "srcmap": "rev": "b12d1ea863b336b120e192700ac11c9744af6cfd" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + git apply --ignore-space-change --ignore-whitespace /src/fuzz_patch.patch Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' coverage = undefined ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + find /src/tensorflow/tensorflow/ -name BUILD -exec sed -i s/tf_cc_fuzz_test/tf_oss_fuzz_fuzztest/g '{}' ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/build:linux --copt=\"-Wno-unknown-warning\"/# overwritten/g' ./.bazelrc Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/build:linux --copt=\"-Wno-array-parameter\"/# overwritten/g' ./.bazelrc Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/build:linux --copt=\"-Wno-stringop-overflow\"/# overwritten/g' ./.bazelrc Step #3 - "compile-libfuzzer-coverage-x86_64": + export TF_PYTHON_VERSION=3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": + TF_PYTHON_VERSION=3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": + PYTHON=python3 Step #3 - "compile-libfuzzer-coverage-x86_64": + yes '' Step #3 - "compile-libfuzzer-coverage-x86_64": + python3 configure.py Step #3 - "compile-libfuzzer-coverage-x86_64": You have bazel 6.4.0 installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify the location of python. [Default is /usr/local/bin/python3]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Found possible Python library paths: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/python3.8/site-packages Step #3 - "compile-libfuzzer-coverage-x86_64": Please input the desired Python library path to use. Default is [/usr/local/lib/python3.8/site-packages] Step #3 - "compile-libfuzzer-coverage-x86_64": Do you wish to build TensorFlow with ROCm support? [y/N]: No ROCm support will be enabled for TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Do you wish to build TensorFlow with CUDA support? [y/N]: No CUDA support will be enabled for TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Do you want to use Clang to build TensorFlow? [Y/n]: Clang will be used to compile TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify the path to clang executable. [Default is /usr/local/bin/clang]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": You have Clang 15.0.0 installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify optimization flags to use during compilation when bazel option "--config=opt" is specified [Default is -Wno-sign-compare]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Would you like to interactively configure ./WORKSPACE for Android builds? [y/N]: Not configuring the WORKSPACE for Android builds. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Preconfigured Bazel build configs. You can use any of the below by adding "--config=<>" to your build command. See .bazelrc for more details. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=mkl # Build with MKL support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=mkl_aarch64 # Build with oneDNN and Compute Library for the Arm Architecture (ACL). Step #3 - "compile-libfuzzer-coverage-x86_64": --config=monolithic # Config for mostly static monolithic build. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=numa # Build with NUMA support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=dynamic_kernels # (Experimental) Build kernels into separate shared objects. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=v1 # Build with TensorFlow 1 API instead of TF 2 API. Step #3 - "compile-libfuzzer-coverage-x86_64": Preconfigured Bazel build configs to DISABLE default on features: Step #3 - "compile-libfuzzer-coverage-x86_64": --config=nogcp # Disable GCP support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=nonccl # Disable NVIDIA NCCL support. Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": ++ '[' coverage = undefined ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ '[' coverage = address ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + declare -r 'EXTRA_FLAGS=--conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e 's/linkstatic/linkopts = \["-fsanitize=fuzzer"\],\nlinkstatic/' tensorflow/security/fuzzing/tf_fuzzing.bzl Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'FUZZTEST_EXTRA_ARGS=--spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic' Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZTEST_EXTRA_ARGS='--spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'FUZZTEST_EXTRA_ARGS=--spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic --local_ram_resources=HOST_RAM*1.0 --local_cpu_resources=HOST_CPUS*.15 --strip=never' Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZTEST_EXTRA_ARGS='--spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic --local_ram_resources=HOST_RAM*1.0 --local_cpu_resources=HOST_CPUS*.15 --strip=never' Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZTEST_DO_SYNC=no Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZTEST_DO_SYNC=no Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZTEST_TARGET_FOLDER=//tensorflow/security/fuzzing/...+//tensorflow/cc/saved_model/...+//tensorflow/cc/framework/fuzzing/...+//tensorflow/core/common_runtime/...+//tensorflow/core/framework/... Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZTEST_TARGET_FOLDER=//tensorflow/security/fuzzing/...+//tensorflow/cc/saved_model/...+//tensorflow/cc/framework/fuzzing/...+//tensorflow/core/common_runtime/...+//tensorflow/core/framework/... Step #3 - "compile-libfuzzer-coverage-x86_64": + export FUZZTEST_EXTRA_TARGETS=//tensorflow/core/kernels/fuzzing:all Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZTEST_EXTRA_TARGETS=//tensorflow/core/kernels/fuzzing:all Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + echo ' write_to_bazelrc('\''import %workspace%/tools/bazel.rc'\'')' Step #3 - "compile-libfuzzer-coverage-x86_64": + yes '' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure Step #3 - "compile-libfuzzer-coverage-x86_64": You have bazel 6.4.0 installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify the location of python. [Default is /usr/local/bin/python3]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Found possible Python library paths: Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/python3.8/site-packages Step #3 - "compile-libfuzzer-coverage-x86_64": Please input the desired Python library path to use. Default is [/usr/local/lib/python3.8/site-packages] Step #3 - "compile-libfuzzer-coverage-x86_64": Do you wish to build TensorFlow with ROCm support? [y/N]: No ROCm support will be enabled for TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Do you wish to build TensorFlow with CUDA support? [y/N]: No CUDA support will be enabled for TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Do you want to use Clang to build TensorFlow? [Y/n]: Clang will be used to compile TensorFlow. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify the path to clang executable. [Default is /usr/local/bin/clang]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": You have Clang 15.0.0 installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Please specify optimization flags to use during compilation when bazel option "--config=opt" is specified [Default is -Wno-sign-compare]: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Would you like to interactively configure ./WORKSPACE for Android builds? [y/N]: Not configuring the WORKSPACE for Android builds. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Preconfigured Bazel build configs. You can use any of the below by adding "--config=<>" to your build command. See .bazelrc for more details. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=mkl # Build with MKL support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=mkl_aarch64 # Build with oneDNN and Compute Library for the Arm Architecture (ACL). Step #3 - "compile-libfuzzer-coverage-x86_64": --config=monolithic # Config for mostly static monolithic build. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=numa # Build with NUMA support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=dynamic_kernels # (Experimental) Build kernels into separate shared objects. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=v1 # Build with TensorFlow 1 API instead of TF 2 API. Step #3 - "compile-libfuzzer-coverage-x86_64": Preconfigured Bazel build configs to DISABLE default on features: Step #3 - "compile-libfuzzer-coverage-x86_64": --config=nogcp # Disable GCP support. Step #3 - "compile-libfuzzer-coverage-x86_64": --config=nonccl # Disable NVIDIA NCCL support. Step #3 - "compile-libfuzzer-coverage-x86_64": Configuration finished Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep '^tf_ops_fuzz_target' tensorflow/core/kernels/fuzzing/BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut '-d"' -f2 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v decode_base64 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v decode_compressed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v one_hot Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v encode_base64 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v scatter_nd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v decode_csv Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v check_numerics Step #3 - "compile-libfuzzer-coverage-x86_64": + declare 'FUZZERS=string_to_number Step #3 - "compile-libfuzzer-coverage-x86_64": encode_jpeg Step #3 - "compile-libfuzzer-coverage-x86_64": decode_bmp Step #3 - "compile-libfuzzer-coverage-x86_64": decode_png Step #3 - "compile-libfuzzer-coverage-x86_64": decode_wav Step #3 - "compile-libfuzzer-coverage-x86_64": example_proto_fast_parsing Step #3 - "compile-libfuzzer-coverage-x86_64": parse_tensor_op Step #3 - "compile-libfuzzer-coverage-x86_64": decode_json_example' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("string_to_number")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("encode_jpeg")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("decode_bmp")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("decode_png")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("decode_wav")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("example_proto_fast_parsing")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("parse_tensor_op")' Step #3 - "compile-libfuzzer-coverage-x86_64": + for fuzzer in ${FUZZERS} Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'cc_tf("decode_json_example")' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ bazel query 'kind(cc_.*, tests(//tensorflow/core/kernels/fuzzing/...))' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v decode_base64 Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting Bazel installation... Step #3 - "compile-libfuzzer-coverage-x86_64": Starting local Bazel server and connecting to it... Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 1 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": + declare 'FUZZERS=//tensorflow/core/kernels/fuzzing:decode_bmp_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:decode_json_example_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:decode_png_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:decode_wav_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:encode_jpeg_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:example_proto_fast_parsing_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:parse_tensor_op_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //tensorflow/core/kernels/fuzzing:string_to_number_fuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzztests.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ //tensorflow/security/fuzzing/...+//tensorflow/cc/saved_model/...+//tensorflow/cc/framework/fuzzing/...+//tensorflow/core/common_runtime/...+//tensorflow/core/framework/... == \u\n\s\e\t ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + TARGET_FOLDER=//tensorflow/security/fuzzing/...+//tensorflow/cc/saved_model/...+//tensorflow/cc/framework/fuzzing/...+//tensorflow/core/common_runtime/...+//tensorflow/core/framework/... Step #3 - "compile-libfuzzer-coverage-x86_64": + BUILD_ARGS='--config=oss-fuzz --subcommands' Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ --spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic --local_ram_resources=HOST_RAM*1.0 --local_cpu_resources=HOST_CPUS*.15 --strip=never != \u\n\s\e\t ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + BUILD_ARGS='--config=oss-fuzz --subcommands --spawn_strategy=sandboxed --action_env=ASAN_OPTIONS=detect_leaks=0,detect_odr_violation=0 --define force_libcpp=enabled --verbose_failures --copt=-UNDEBUG --config=monolithic --local_ram_resources=HOST_RAM*1.0 --local_cpu_resources=HOST_CPUS*.15 --strip=never' Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel run @com_google_fuzztest//bazel:setup_configs Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Reading 'startup' options from /src/tensorflow/.bazelrc: --windows_enable_symlinks Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Options provided by the client: Step #3 - "compile-libfuzzer-coverage-x86_64": Inherited 'common' options: --isatty=0 --terminal_columns=80 Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Reading rc options for 'run' from /src/tensorflow/.bazelrc: Step #3 - "compile-libfuzzer-coverage-x86_64": Inherited 'common' options: --experimental_repo_remote_exec Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Reading rc options for 'run' from /src/tensorflow/.bazelrc: Step #3 - "compile-libfuzzer-coverage-x86_64": Inherited 'build' options: --define framework_shared_object=true --define tsl_protobuf_header_only=true --define=use_fast_cpp_protos=true --define=allow_oversize_protos=true --spawn_strategy=standalone -c opt --announce_rc --define=grpc_no_ares=true --noincompatible_remove_legacy_whole_archive --features=-force_no_whole_archive --enable_platform_specific_config --define=with_xla_support=true --config=short_logs --config=v2 --define=no_aws_support=true --define=no_hdfs_support=true --experimental_cc_shared_library --experimental_link_static_libraries_once=false --incompatible_enforce_config_setting_visibility Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Reading rc options for 'run' from /src/tensorflow/.tf_configure.bazelrc: Step #3 - "compile-libfuzzer-coverage-x86_64": Inherited 'build' options: --action_env PYTHON_BIN_PATH=/usr/local/bin/python3 --action_env PYTHON_LIB_PATH=/usr/local/lib/python3.8/site-packages --python_path=/usr/local/bin/python3 --action_env CLANG_COMPILER_PATH=/usr/local/bin/clang-15 --repo_env=CC=/usr/local/bin/clang-15 --repo_env=BAZEL_COMPILER=/usr/local/bin/clang-15 Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Reading rc options for 'run' from /root/.bazelrc: Step #3 - "compile-libfuzzer-coverage-x86_64": Inherited 'build' options: --action_env=FUZZ_INTROSPECTOR --action_env=FUZZINTRO_OUTDIR Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found applicable config definition build:short_logs in file /src/tensorflow/.bazelrc: --output_filter=DONT_MATCH_ANYTHING Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found applicable config definition build:v2 in file /src/tensorflow/.bazelrc: --define=tf_api_version=2 --action_env=TF2_BEHAVIOR=1 Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found applicable config definition build:linux in file /src/tensorflow/.bazelrc: --host_copt=-w --copt=-Wno-all --copt=-Wno-extra --copt=-Wno-deprecated --copt=-Wno-deprecated-declarations --copt=-Wno-ignored-attributes --copt=-Wno-array-bounds --copt=-Wunused-result --copt=-Werror=unused-result --copt=-Wswitch --copt=-Werror=switch --copt=-Wno-error=unused-but-set-variable --define=PREFIX=/usr --define=LIBDIR=$(PREFIX)/lib --define=INCLUDEDIR=$(PREFIX)/include --define=PROTOBUF_INCLUDE_PATH=$(PREFIX)/include --cxxopt=-std=c++17 --host_cxxopt=-std=c++17 --config=dynamic_kernels --experimental_guard_against_concurrent_changes Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found applicable config definition build:dynamic_kernels in file /src/tensorflow/.bazelrc: --define=dynamic_loaded_kernels=true --copt=-DAUTOLOAD_DYNAMIC_KERNELS Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (46 packages loaded, 21 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @com_google_fuzztest//bazel:setup_configs (52 packages loaded, 258 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Analyzed target @com_google_fuzztest//bazel:setup_configs (55 packages loaded, 285 targets configured). Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found 1 target... Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 4] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Target @com_google_fuzztest//bazel:setup_configs up-to-date: Step #3 - "compile-libfuzzer-coverage-x86_64": bazel-bin/external/com_google_fuzztest/bazel/setup_configs Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Elapsed time: 25.196s, Critical Path: 0.03s Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: 4 processes: 4 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Build completed successfully, 4 total actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Running command line: bazel-bin/external/com_google_fuzztest/bazel/setup_configs @com_google_fuzztest Step #3 - "compile-libfuzzer-coverage-x86_64": ++ bazel query 'kind("cc_test", rdeps(//tensorflow/security/fuzzing/...+//tensorflow/cc/saved_model/...+//tensorflow/cc/framework/fuzzing/...+//tensorflow/core/common_runtime/...+//tensorflow/core/framework/..., @com_google_fuzztest//fuzztest:fuzztest_gtest_main))' Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: Traceback (most recent call last): Step #3 - "compile-libfuzzer-coverage-x86_64": File "/root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/platforms/BUILD", line 8, column 8, in Step #3 - "compile-libfuzzer-coverage-x86_64": license( Step #3 - "compile-libfuzzer-coverage-x86_64": File "/root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/rules_license/rules/license.bzl", line 110, column 13, in license Step #3 - "compile-libfuzzer-coverage-x86_64": fail("Specified license file doesn't exist: %s" % license_text) Step #3 - "compile-libfuzzer-coverage-x86_64": Error in fail: Specified license file doesn't exist: LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository double_conversion instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:84:14: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:928:21: in workspace Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:629:20: in _tf_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:136:21: in tf_http_archive Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule _tf_http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:89:35: in Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository pypi__installer instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:61:10: in Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/rules_python/python/pip.bzl:150:29: in pip_parse Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/rules_python/python/pip_install/repositories.bzl:148:14: in pip_install_dependencies Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository onednn instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:84:14: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:928:21: in workspace Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:197:20: in _tf_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:136:21: in tf_http_archive Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule _tf_http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:89:35: in Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository boringssl instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:84:14: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:928:21: in workspace Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:469:20: in _tf_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:136:21: in tf_http_archive Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule _tf_http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:89:35: in Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository mkl_dnn_acl_compatible instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:84:14: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:928:21: in workspace Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:205:20: in _tf_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:136:21: in tf_http_archive Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule _tf_http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:89:35: in Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Repository libjpeg_turbo instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/WORKSPACE:84:14: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:921:28: in workspace Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/tensorflow/workspace2.bzl:77:9: in _initialize_third_party Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/jpeg/workspace.bzl:6:20: in repo Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:136:21: in tf_http_archive Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule _tf_http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tensorflow/third_party/repo.bzl:89:35: in Step #3 - "compile-libfuzzer-coverage-x86_64": ERROR: Evaluation of subquery "rdeps((//tensorflow/security/fuzzing/... + //tensorflow/cc/saved_model/... + //tensorflow/cc/framework/fuzzing/... + //tensorflow/core/common_runtime/... + //tensorflow/core/framework/...), @com_google_fuzztest//fuzztest:fuzztest_gtest_main)" failed (did you want to use --keep_going?): preloading transitive closure failed: no such target '@platforms//:incompatible': target 'incompatible' not declared in package '' defined by /root/.cache/bazel/_bazel_root/1c025c2968c1aa16bac5eca67aaf21d1/external/platforms/BUILD (Tip: use `query "@platforms//:*"` to see all the targets in that package) Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 228 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @tf_runtime// ... (7 packages) Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TEST_BINARIES= Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image tensorflow Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 tensorflow Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1