starting build "16c8a998-f729-4898-850d-3706f9d374ce" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.68kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: f39d80ca7021: Pulling fs layer Step #1: 3f7b104caa94: Pulling fs layer Step #1: 98d63d9f6c98: Pulling fs layer Step #1: 18e56a74fe3b: Pulling fs layer Step #1: d374a6bee675: Pulling fs layer Step #1: ec334fd6e8fa: Pulling fs layer Step #1: e3e240b0cd50: Pulling fs layer Step #1: b2512e0eab51: Pulling fs layer Step #1: 4223d1ba77d3: Pulling fs layer Step #1: 8d45a907f5ae: Pulling fs layer Step #1: 44ae4f1bee4d: Pulling fs layer Step #1: 5e1d39d83edd: Pulling fs layer Step #1: 96c98dcd7e17: Pulling fs layer Step #1: 136e28fc29c9: Pulling fs layer Step #1: af65c42a8b64: Pulling fs layer Step #1: a144ab822a62: Pulling fs layer Step #1: bcbe3735701b: Pulling fs layer Step #1: efddb1001a19: Pulling fs layer Step #1: f2e49f1ff49e: Pulling fs layer Step #1: 2f0cc467e898: Pulling fs layer Step #1: b1b7efa61c06: Pulling fs layer Step #1: 64c91e3d268f: Pulling fs layer Step #1: 731f380c2ff1: Pulling fs layer Step #1: fd03b6508997: Pulling fs layer Step #1: ff008d189a82: Pulling fs layer Step #1: 29aa799e57e6: Pulling fs layer Step #1: ae08d37ab679: Pulling fs layer Step #1: 35fa612f5131: Pulling fs layer Step #1: 44ae4f1bee4d: Waiting Step #1: 11c964e3f593: Pulling fs layer Step #1: 8d45a907f5ae: Waiting Step #1: 4e7bf651b6b4: Pulling fs layer Step #1: 96c98dcd7e17: Waiting Step #1: 7b105a7ee1bc: Pulling fs layer Step #1: ec334fd6e8fa: Waiting Step #1: 98d63d9f6c98: Waiting Step #1: 729758dd3f83: Pulling fs layer Step #1: 5e1d39d83edd: Waiting Step #1: e3e240b0cd50: Waiting Step #1: c744ce97d41c: Pulling fs layer Step #1: b2512e0eab51: Waiting Step #1: 136e28fc29c9: Waiting Step #1: 731f380c2ff1: Waiting Step #1: fd03b6508997: Waiting Step #1: af65c42a8b64: Waiting Step #1: 35fa612f5131: Waiting Step #1: f2e49f1ff49e: Waiting Step #1: ff008d189a82: Waiting Step #1: bcbe3735701b: Waiting Step #1: a144ab822a62: Waiting Step #1: 29aa799e57e6: Waiting Step #1: efddb1001a19: Waiting Step #1: 11c964e3f593: Waiting Step #1: 2f0cc467e898: Waiting Step #1: ae08d37ab679: Waiting Step #1: 729758dd3f83: Waiting Step #1: 18e56a74fe3b: Waiting Step #1: 4223d1ba77d3: Waiting Step #1: d374a6bee675: Waiting Step #1: 7b105a7ee1bc: Waiting Step #1: 4e7bf651b6b4: Waiting Step #1: 3f7b104caa94: Verifying Checksum Step #1: 3f7b104caa94: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 18e56a74fe3b: Verifying Checksum Step #1: 18e56a74fe3b: Download complete Step #1: 98d63d9f6c98: Verifying Checksum Step #1: 98d63d9f6c98: Download complete Step #1: d374a6bee675: Verifying Checksum Step #1: d374a6bee675: Download complete Step #1: e3e240b0cd50: Verifying Checksum Step #1: e3e240b0cd50: Download complete Step #1: f39d80ca7021: Verifying Checksum Step #1: f39d80ca7021: Download complete Step #1: b2512e0eab51: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8d45a907f5ae: Verifying Checksum Step #1: 8d45a907f5ae: Download complete Step #1: 44ae4f1bee4d: Verifying Checksum Step #1: 44ae4f1bee4d: Download complete Step #1: 5e1d39d83edd: Download complete Step #1: 96c98dcd7e17: Verifying Checksum Step #1: 96c98dcd7e17: Download complete Step #1: 136e28fc29c9: Verifying Checksum Step #1: 136e28fc29c9: Download complete Step #1: 4223d1ba77d3: Verifying Checksum Step #1: 4223d1ba77d3: Download complete Step #1: af65c42a8b64: Download complete Step #1: bcbe3735701b: Verifying Checksum Step #1: bcbe3735701b: Download complete Step #1: a144ab822a62: Verifying Checksum Step #1: a144ab822a62: Download complete Step #1: efddb1001a19: Verifying Checksum Step #1: efddb1001a19: Download complete Step #1: f2e49f1ff49e: Verifying Checksum Step #1: f2e49f1ff49e: Download complete Step #1: 2f0cc467e898: Verifying Checksum Step #1: 2f0cc467e898: Download complete Step #1: b1b7efa61c06: Download complete Step #1: 64c91e3d268f: Verifying Checksum Step #1: 64c91e3d268f: Download complete Step #1: 731f380c2ff1: Verifying Checksum Step #1: 731f380c2ff1: Download complete Step #1: ec334fd6e8fa: Verifying Checksum Step #1: ec334fd6e8fa: Download complete Step #1: fd03b6508997: Download complete Step #1: ff008d189a82: Verifying Checksum Step #1: ff008d189a82: Download complete Step #1: 29aa799e57e6: Verifying Checksum Step #1: 29aa799e57e6: Download complete Step #1: ae08d37ab679: Verifying Checksum Step #1: ae08d37ab679: Download complete Step #1: 35fa612f5131: Verifying Checksum Step #1: 35fa612f5131: Download complete Step #1: 4e7bf651b6b4: Verifying Checksum Step #1: 4e7bf651b6b4: Download complete Step #1: 7b105a7ee1bc: Download complete Step #1: 11c964e3f593: Verifying Checksum Step #1: 11c964e3f593: Download complete Step #1: 729758dd3f83: Verifying Checksum Step #1: 729758dd3f83: Download complete Step #1: c744ce97d41c: Verifying Checksum Step #1: c744ce97d41c: Download complete Step #1: f39d80ca7021: Pull complete Step #1: 3f7b104caa94: Pull complete Step #1: 98d63d9f6c98: Pull complete Step #1: 18e56a74fe3b: Pull complete Step #1: d374a6bee675: Pull complete Step #1: ec334fd6e8fa: Pull complete Step #1: e3e240b0cd50: Pull complete Step #1: b2512e0eab51: Pull complete Step #1: 4223d1ba77d3: Pull complete Step #1: 8d45a907f5ae: Pull complete Step #1: 44ae4f1bee4d: Pull complete Step #1: 5e1d39d83edd: Pull complete Step #1: 96c98dcd7e17: Pull complete Step #1: 136e28fc29c9: Pull complete Step #1: af65c42a8b64: Pull complete Step #1: a144ab822a62: Pull complete Step #1: bcbe3735701b: Pull complete Step #1: efddb1001a19: Pull complete Step #1: f2e49f1ff49e: Pull complete Step #1: 2f0cc467e898: Pull complete Step #1: b1b7efa61c06: Pull complete Step #1: 64c91e3d268f: Pull complete Step #1: 731f380c2ff1: Pull complete Step #1: fd03b6508997: Pull complete Step #1: ff008d189a82: Pull complete Step #1: 29aa799e57e6: Pull complete Step #1: ae08d37ab679: Pull complete Step #1: 35fa612f5131: Pull complete Step #1: 11c964e3f593: Pull complete Step #1: 4e7bf651b6b4: Pull complete Step #1: 7b105a7ee1bc: Pull complete Step #1: 729758dd3f83: Pull complete Step #1: c744ce97d41c: Pull complete Step #1: Digest: sha256:35a7e82a227062d56e171abbfd7d5434e01fb0e57a9e4f5e4c881bc319cbe9be Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 5f32d8731ed3 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y make autoconf libgtest-dev Step #1: ---> Running in 8c418b6c2865 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (541 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: automake autotools-dev googletest libsigsegv2 m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc libtool gettext m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev googletest libgtest-dev libsigsegv2 m4 Step #1: 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 3303 kB of archives. Step #1: After this operation, 25.6 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/universe amd64 googletest all 1.10.0-2 [623 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/universe amd64 libgtest-dev amd64 1.10.0-2 [1583 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 3303 kB in 0s (9749 kB/s) Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../1-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../2-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../3-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../4-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package googletest. Step #1: Preparing to unpack .../5-googletest_1.10.0-2_all.deb ... Step #1: Unpacking googletest (1.10.0-2) ... Step #1: Selecting previously unselected package libgtest-dev:amd64. Step #1: Preparing to unpack .../6-libgtest-dev_1.10.0-2_amd64.deb ... Step #1: Unpacking libgtest-dev:amd64 (1.10.0-2) ... Step #1: Setting up googletest (1.10.0-2) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libgtest-dev:amd64 (1.10.0-2) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 8c418b6c2865 Step #1: ---> a4261683f19b Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/google/cctz Step #1: ---> Running in 3adbfe3e25c2 Step #1: Cloning into 'cctz'... Step #1: Removing intermediate container 3adbfe3e25c2 Step #1: ---> b74562e2ea0a Step #1: Step 4/6 : WORKDIR $SRC/cctz Step #1: ---> Running in c13b8a079307 Step #1: Removing intermediate container c13b8a079307 Step #1: ---> 59586f0cc030 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 18c6134594df Step #1: Step 6/6 : COPY fuzz_* $SRC/ Step #1: ---> 4fe7a2b9ed81 Step #1: Successfully built 4fe7a2b9ed81 Step #1: Successfully tagged gcr.io/oss-fuzz/cctz:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/cctz Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileG6kUFP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cctz/.git Step #2 - "srcmap": + GIT_DIR=/src/cctz Step #2 - "srcmap": + cd /src/cctz Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/cctz Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1f2268a1b66f413095a4f3dfc2ff87cbe425fbf4 Step #2 - "srcmap": + jq_inplace /tmp/fileG6kUFP '."/src/cctz" = { type: "git", url: "https://github.com/google/cctz", rev: "1f2268a1b66f413095a4f3dfc2ff87cbe425fbf4" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileVL2MMc Step #2 - "srcmap": + cat /tmp/fileG6kUFP Step #2 - "srcmap": + jq '."/src/cctz" = { type: "git", url: "https://github.com/google/cctz", rev: "1f2268a1b66f413095a4f3dfc2ff87cbe425fbf4" }' Step #2 - "srcmap": + mv /tmp/fileVL2MMc /tmp/fileG6kUFP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileG6kUFP Step #2 - "srcmap": + rm /tmp/fileG6kUFP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cctz": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/cctz", Step #2 - "srcmap": "rev": "1f2268a1b66f413095a4f3dfc2ff87cbe425fbf4" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -DBUILD_TESTING=OFF -DBUILD_BENCHMARK=OFF ../ Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (0.3s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/cctz/build Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building CXX object CMakeFiles/cctz.dir/src/civil_time_detail.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_fixed.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_format.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_if.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_impl.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_info.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_libc.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_lookup.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object CMakeFiles/cctz.dir/src/time_zone_posix.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building CXX object CMakeFiles/cctz.dir/src/zone_info_source.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Linking CXX static library libcctz.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Built target cctz Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building CXX object CMakeFiles/time_tool.dir/src/time_tool.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Linking CXX executable time_tool Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Built target time_tool Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building CXX object examples/CMakeFiles/classic.dir/classic.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Linking CXX executable classic Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Built target classic Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building CXX object examples/CMakeFiles/hello.dir/hello.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Linking CXX executable hello Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Built target hello Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building CXX object examples/CMakeFiles/epoch_shift.dir/epoch_shift.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Linking CXX executable epoch_shift Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Built target epoch_shift Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building CXX object examples/CMakeFiles/example1.dir/example1.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Linking CXX executable example1 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Built target example1 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building CXX object examples/CMakeFiles/example2.dir/example2.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Linking CXX executable example2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Built target example2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building CXX object examples/CMakeFiles/example3.dir/example3.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Linking CXX executable example3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Built target example3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building CXX object examples/CMakeFiles/example4.dir/example4.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking CXX executable example4 Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target example4 Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/fuzz_cctz.cc . Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fsanitize=fuzzer ./fuzz_cctz.cc ./libcctz.a -I../include/ -o /workspace/out/libfuzzer-coverage-x86_64/fuzz_cctz Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f39d80ca7021: Already exists Step #4: 3f7b104caa94: Already exists Step #4: fb13a18b8d24: Pulling fs layer Step #4: 1e6f70e73fed: Pulling fs layer Step #4: c8c19f1a206d: Pulling fs layer Step #4: 0bccc74b0cc0: Pulling fs layer Step #4: fc73d508fba8: Pulling fs layer Step #4: 076d4d0c30b1: Pulling fs layer Step #4: 1763470f3f22: Pulling fs layer Step #4: 88fe58210e04: Pulling fs layer Step #4: a2d0fdcf2123: Pulling fs layer Step #4: 13a1399396a7: Pulling fs layer Step #4: 0f69f8b7d97d: Pulling fs layer Step #4: 46813ec47842: Pulling fs layer Step #4: 6860115fd42a: Pulling fs layer Step #4: 5256a36340c7: Pulling fs layer Step #4: 465e42175aa3: Pulling fs layer Step #4: 70d46b3445a4: Pulling fs layer Step #4: 2cf450df525b: Pulling fs layer Step #4: e491ffded19a: Pulling fs layer Step #4: 0b512f445b6d: Pulling fs layer Step #4: e9a0aa9dd6dc: Pulling fs layer Step #4: f235e0212358: Pulling fs layer Step #4: 0cdaacbae252: Pulling fs layer Step #4: 36c8153c465a: Pulling fs layer Step #4: 2cf450df525b: Waiting Step #4: a2d0fdcf2123: Waiting Step #4: 13a1399396a7: Waiting Step #4: 0f69f8b7d97d: Waiting Step #4: 46813ec47842: Waiting Step #4: 0bccc74b0cc0: Waiting Step #4: 6860115fd42a: Waiting Step #4: 70d46b3445a4: Waiting Step #4: fc73d508fba8: Waiting Step #4: 076d4d0c30b1: Waiting Step #4: 5256a36340c7: Waiting Step #4: 465e42175aa3: Waiting Step #4: f235e0212358: Waiting Step #4: 1763470f3f22: Waiting Step #4: e491ffded19a: Waiting Step #4: 0cdaacbae252: Waiting Step #4: 36c8153c465a: Waiting Step #4: 0b512f445b6d: Waiting Step #4: c8c19f1a206d: Download complete Step #4: fb13a18b8d24: Download complete Step #4: 1e6f70e73fed: Verifying Checksum Step #4: 1e6f70e73fed: Download complete Step #4: fc73d508fba8: Verifying Checksum Step #4: fc73d508fba8: Download complete Step #4: fb13a18b8d24: Pull complete Step #4: 0bccc74b0cc0: Verifying Checksum Step #4: 0bccc74b0cc0: Download complete Step #4: 1763470f3f22: Verifying Checksum Step #4: 1763470f3f22: Download complete Step #4: 88fe58210e04: Verifying Checksum Step #4: 88fe58210e04: Download complete Step #4: a2d0fdcf2123: Verifying Checksum Step #4: a2d0fdcf2123: Download complete Step #4: 1e6f70e73fed: Pull complete Step #4: c8c19f1a206d: Pull complete Step #4: 076d4d0c30b1: Verifying Checksum Step #4: 076d4d0c30b1: Download complete Step #4: 0f69f8b7d97d: Verifying Checksum Step #4: 0f69f8b7d97d: Download complete Step #4: 46813ec47842: Verifying Checksum Step #4: 46813ec47842: Download complete Step #4: 0bccc74b0cc0: Pull complete Step #4: 6860115fd42a: Verifying Checksum Step #4: 6860115fd42a: Download complete Step #4: fc73d508fba8: Pull complete Step #4: 465e42175aa3: Download complete Step #4: 13a1399396a7: Verifying Checksum Step #4: 13a1399396a7: Download complete Step #4: 5256a36340c7: Verifying Checksum Step #4: 5256a36340c7: Download complete Step #4: 2cf450df525b: Verifying Checksum Step #4: 2cf450df525b: Download complete Step #4: e491ffded19a: Download complete Step #4: 0b512f445b6d: Verifying Checksum Step #4: 0b512f445b6d: Download complete Step #4: e9a0aa9dd6dc: Verifying Checksum Step #4: e9a0aa9dd6dc: Download complete Step #4: f235e0212358: Verifying Checksum Step #4: f235e0212358: Download complete Step #4: 0cdaacbae252: Verifying Checksum Step #4: 0cdaacbae252: Download complete Step #4: 36c8153c465a: Verifying Checksum Step #4: 36c8153c465a: Download complete Step #4: 076d4d0c30b1: Pull complete Step #4: 70d46b3445a4: Verifying Checksum Step #4: 70d46b3445a4: Download complete Step #4: 1763470f3f22: Pull complete Step #4: 88fe58210e04: Pull complete Step #4: a2d0fdcf2123: Pull complete Step #4: 13a1399396a7: Pull complete Step #4: 0f69f8b7d97d: Pull complete Step #4: 46813ec47842: Pull complete Step #4: 6860115fd42a: Pull complete Step #4: 5256a36340c7: Pull complete Step #4: 465e42175aa3: Pull complete Step #4: 70d46b3445a4: Pull complete Step #4: 2cf450df525b: Pull complete Step #4: e491ffded19a: Pull complete Step #4: 0b512f445b6d: Pull complete Step #4: e9a0aa9dd6dc: Pull complete Step #4: f235e0212358: Pull complete Step #4: 0cdaacbae252: Pull complete Step #4: 36c8153c465a: Pull complete Step #4: Digest: sha256:8a72aa1d5aca33da78cb3d3358c751907a98e497b6fc228853bb1a3867714c50 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_cctz.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_cctz.zip or Step #5: /corpus/fuzz_cctz.zip.zip, and cannot find /corpus/fuzz_cctz.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_cctz. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image cctz Step #5: python infra/helper.py build_fuzzers --sanitizer coverage cctz Step #5: python infra/helper.py coverage cctz Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1