starting build "84f65914-10f4-40d9-9c0d-21b24912da86" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 16.9kB Step #1: Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 800687449569: Pulling fs layer Step #1: 67cc84ed39bf: Pulling fs layer Step #1: 33c4464df317: Pulling fs layer Step #1: 7a3d59ffed63: Pulling fs layer Step #1: bc24bccd8f7c: Pulling fs layer Step #1: 18d20619fb8d: Pulling fs layer Step #1: 0ec212d79142: Pulling fs layer Step #1: 0d731e844f5b: Pulling fs layer Step #1: 03e6d4298870: Pulling fs layer Step #1: 9cb6c9480ffe: Pulling fs layer Step #1: 636367483a85: Pulling fs layer Step #1: ab160a08f40f: Pulling fs layer Step #1: d56fb1501120: Pulling fs layer Step #1: 6e5ee80d4b76: Pulling fs layer Step #1: 069b70ca1828: Pulling fs layer Step #1: 082a5c4ba783: Pulling fs layer Step #1: aeb889ce9374: Pulling fs layer Step #1: b3c77a307741: Pulling fs layer Step #1: 19afa95abd0d: Pulling fs layer Step #1: 3331bfca5447: Pulling fs layer Step #1: ca89507fe8d3: Pulling fs layer Step #1: 093d0a8d4813: Pulling fs layer Step #1: 562130e5e1f0: Pulling fs layer Step #1: c78d65770fdc: Pulling fs layer Step #1: d8a48a39f3bb: Pulling fs layer Step #1: d547270a8392: Pulling fs layer Step #1: cd72b15f7674: Pulling fs layer Step #1: fed123fa2f8a: Pulling fs layer Step #1: 39a8609a58c5: Pulling fs layer Step #1: 082a5c4ba783: Waiting Step #1: 33c4464df317: Waiting Step #1: 7a3d59ffed63: Waiting Step #1: bc24bccd8f7c: Waiting Step #1: aeb889ce9374: Waiting Step #1: b3c77a307741: Waiting Step #1: 18d20619fb8d: Waiting Step #1: 19afa95abd0d: Waiting Step #1: 3331bfca5447: Waiting Step #1: ca89507fe8d3: Waiting Step #1: 093d0a8d4813: Waiting Step #1: 562130e5e1f0: Waiting Step #1: cd72b15f7674: Waiting Step #1: c78d65770fdc: Waiting Step #1: fed123fa2f8a: Waiting Step #1: d8a48a39f3bb: Waiting Step #1: 39a8609a58c5: Waiting Step #1: d547270a8392: Waiting Step #1: 0ec212d79142: Waiting Step #1: 0d731e844f5b: Waiting Step #1: 03e6d4298870: Waiting Step #1: 9cb6c9480ffe: Waiting Step #1: 636367483a85: Waiting Step #1: 6e5ee80d4b76: Waiting Step #1: ab160a08f40f: Waiting Step #1: d56fb1501120: Waiting Step #1: 069b70ca1828: Waiting Step #1: 67cc84ed39bf: Verifying Checksum Step #1: 67cc84ed39bf: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 33c4464df317: Verifying Checksum Step #1: 33c4464df317: Download complete Step #1: 7a3d59ffed63: Verifying Checksum Step #1: 7a3d59ffed63: Download complete Step #1: bc24bccd8f7c: Verifying Checksum Step #1: bc24bccd8f7c: Download complete Step #1: 0ec212d79142: Verifying Checksum Step #1: 0ec212d79142: Download complete Step #1: 0d731e844f5b: Verifying Checksum Step #1: 0d731e844f5b: Download complete Step #1: 800687449569: Verifying Checksum Step #1: 800687449569: Download complete Step #1: 9cb6c9480ffe: Verifying Checksum Step #1: 9cb6c9480ffe: Download complete Step #1: 636367483a85: Verifying Checksum Step #1: 636367483a85: Download complete Step #1: ab160a08f40f: Download complete Step #1: b549f31133a9: Pull complete Step #1: d56fb1501120: Verifying Checksum Step #1: d56fb1501120: Download complete Step #1: 6e5ee80d4b76: Verifying Checksum Step #1: 6e5ee80d4b76: Download complete Step #1: 069b70ca1828: Verifying Checksum Step #1: 069b70ca1828: Download complete Step #1: 082a5c4ba783: Verifying Checksum Step #1: 082a5c4ba783: Download complete Step #1: 03e6d4298870: Verifying Checksum Step #1: 03e6d4298870: Download complete Step #1: aeb889ce9374: Download complete Step #1: b3c77a307741: Verifying Checksum Step #1: b3c77a307741: Download complete Step #1: 19afa95abd0d: Verifying Checksum Step #1: 19afa95abd0d: Download complete Step #1: 3331bfca5447: Verifying Checksum Step #1: 3331bfca5447: Download complete Step #1: 093d0a8d4813: Verifying Checksum Step #1: 093d0a8d4813: Download complete Step #1: ca89507fe8d3: Verifying Checksum Step #1: ca89507fe8d3: Download complete Step #1: 562130e5e1f0: Verifying Checksum Step #1: 562130e5e1f0: Download complete Step #1: c78d65770fdc: Download complete Step #1: d8a48a39f3bb: Verifying Checksum Step #1: d8a48a39f3bb: Download complete Step #1: cd72b15f7674: Verifying Checksum Step #1: cd72b15f7674: Download complete Step #1: d547270a8392: Download complete Step #1: fed123fa2f8a: Verifying Checksum Step #1: fed123fa2f8a: Download complete Step #1: 39a8609a58c5: Verifying Checksum Step #1: 39a8609a58c5: Download complete Step #1: 18d20619fb8d: Verifying Checksum Step #1: 18d20619fb8d: Download complete Step #1: 800687449569: Pull complete Step #1: 67cc84ed39bf: Pull complete Step #1: 33c4464df317: Pull complete Step #1: 7a3d59ffed63: Pull complete Step #1: bc24bccd8f7c: Pull complete Step #1: 18d20619fb8d: Pull complete Step #1: 0ec212d79142: Pull complete Step #1: 0d731e844f5b: Pull complete Step #1: 03e6d4298870: Pull complete Step #1: 9cb6c9480ffe: Pull complete Step #1: 636367483a85: Pull complete Step #1: ab160a08f40f: Pull complete Step #1: d56fb1501120: Pull complete Step #1: 6e5ee80d4b76: Pull complete Step #1: 069b70ca1828: Pull complete Step #1: 082a5c4ba783: Pull complete Step #1: aeb889ce9374: Pull complete Step #1: b3c77a307741: Pull complete Step #1: 19afa95abd0d: Pull complete Step #1: 3331bfca5447: Pull complete Step #1: ca89507fe8d3: Pull complete Step #1: 093d0a8d4813: Pull complete Step #1: 562130e5e1f0: Pull complete Step #1: c78d65770fdc: Pull complete Step #1: d8a48a39f3bb: Pull complete Step #1: d547270a8392: Pull complete Step #1: cd72b15f7674: Pull complete Step #1: fed123fa2f8a: Pull complete Step #1: 39a8609a58c5: Pull complete Step #1: Digest: sha256:e8550ff2b57077cb14770e2ec5a77bdcd040c602412df65fe7355825f55ed250 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> d548bd1f3608 Step #1: Step 2/8 : RUN apt-get update && apt-get --no-install-recommends install -y build-essential make curl wget rsync Step #1: ---> Running in 29b7f10c73fa Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (111 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: build-essential is already the newest version (12.8ubuntu1.1). Step #1: curl is already the newest version (7.68.0-1ubuntu2.20). Step #1: rsync is already the newest version (3.1.3-8ubuntu0.7). Step #1: wget is already the newest version (1.20.3-1ubuntu2). Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container 29b7f10c73fa Step #1: ---> 72c3faa4b876 Step #1: Step 3/8 : RUN echo "deb [arch=amd64] http://storage.googleapis.com/bazel-apt stable jdk1.8" | tee /etc/apt/sources.list.d/bazel.list Step #1: ---> Running in 21360db651c5 Step #1: deb [arch=amd64] http://storage.googleapis.com/bazel-apt stable jdk1.8 Step #1: Removing intermediate container 21360db651c5 Step #1: ---> 61f493bf1808 Step #1: Step 4/8 : RUN curl https://bazel.build/bazel-release.pub.gpg | apt-key add - Step #1: ---> Running in 1d64f861a3a9 Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1: Dload Upload Total Spent Left Speed Step #1: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0Warning: apt-key output should not be parsed (stdout is not a terminal) Step #1:  100 4714 100 4714 0 0 23808 0 --:--:-- --:--:-- --:--:-- 23808 Step #1: OK Step #1: Removing intermediate container 1d64f861a3a9 Step #1: ---> 40f2cb8bde7d Step #1: Step 5/8 : RUN apt-get update && apt-get install -y bazel Step #1: ---> Running in 02defe58cf12 Step #1: Get:1 http://storage.googleapis.com/bazel-apt stable InRelease [2262 B] Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:3 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:4 http://storage.googleapis.com/bazel-apt stable/jdk1.8 amd64 Packages [11.2 kB] Step #1: Hit:5 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #1: Hit:6 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 13.5 kB in 1s (21.5 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: zlib1g-dev Step #1: Suggested packages: Step #1: google-jdk | java8-sdk-headless | java8-jdk | java8-sdk Step #1: | oracle-java8-installer bash-completion Step #1: The following NEW packages will be installed: Step #1: bazel zlib1g-dev Step #1: 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 51.1 MB of archives. Step #1: After this operation, 607 kB of additional disk space will be used. Step #1: Get:1 http://storage.googleapis.com/bazel-apt stable/jdk1.8 amd64 bazel amd64 6.4.0 [51.0 MB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 51.1 MB in 1s (70.1 MB/s) Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17382 files and directories currently installed.) Step #1: Preparing to unpack .../zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package bazel. Step #1: Preparing to unpack .../archives/bazel_6.4.0_amd64.deb ... Step #1: Unpacking bazel (6.4.0) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up bazel (6.4.0) ... Step #1: Removing intermediate container 02defe58cf12 Step #1: ---> 28a936a95524 Step #1: Step 6/8 : RUN curl -Lo /usr/bin/bazel https://github.com/bazelbuild/bazelisk/releases/download/v1.1.0/bazelisk-linux-amd64 && chmod +x /usr/bin/bazel Step #1: ---> Running in 7ec2a2b2e2f5 Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1: Dload Upload Total Spent Left Speed Step #1: 0  0 0  0  0  0 0  0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #1:  100 6036k 100 6036k 0 0 17.5M 0 --:--:-- --:--:-- --:--:-- 17.5M Step #1: Removing intermediate container 7ec2a2b2e2f5 Step #1: ---> 98f7b0753f93 Step #1: Step 7/8 : RUN git clone --depth 1 https://github.com/abseil/abseil-cpp.git Step #1: ---> Running in 5a7bdff06ce6 Step #1: Cloning into 'abseil-cpp'... Step #1: Removing intermediate container 5a7bdff06ce6 Step #1: ---> af57a01f7d12 Step #1: Step 8/8 : COPY BUILD WORKSPACE build.sh string_escape_fuzzer.cc string_utilities_fuzzer.cc $SRC/ Step #1: ---> 1c70ba89e725 Step #1: Successfully built 1c70ba89e725 Step #1: Successfully tagged gcr.io/oss-fuzz/abseil-cpp:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/abseil-cpp Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filej4e7QN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/abseil-cpp/.git Step #2 - "srcmap": + GIT_DIR=/src/abseil-cpp Step #2 - "srcmap": + cd /src/abseil-cpp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/abseil/abseil-cpp.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=8028a87c96df0fff5ab58daeec30c43ce6fb0d20 Step #2 - "srcmap": + jq_inplace /tmp/filej4e7QN '."/src/abseil-cpp" = { type: "git", url: "https://github.com/abseil/abseil-cpp.git", rev: "8028a87c96df0fff5ab58daeec30c43ce6fb0d20" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file5fuP4c Step #2 - "srcmap": + cat /tmp/filej4e7QN Step #2 - "srcmap": + jq '."/src/abseil-cpp" = { type: "git", url: "https://github.com/abseil/abseil-cpp.git", rev: "8028a87c96df0fff5ab58daeec30c43ce6fb0d20" }' Step #2 - "srcmap": + mv /tmp/file5fuP4c /tmp/filej4e7QN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filej4e7QN Step #2 - "srcmap": + rm /tmp/filej4e7QN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/abseil-cpp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/abseil/abseil-cpp.git", Step #2 - "srcmap": "rev": "8028a87c96df0fff5ab58daeec30c43ce6fb0d20" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-std=c++14 --linkopt=-std=c++14 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ '[' coverage = undefined ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + readonly 'EXTRA_BAZEL_FLAGS=--conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-std=c++14 --linkopt=-std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + EXTRA_BAZEL_FLAGS='--conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-std=c++14 --linkopt=-std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGETS=("string_escape_fuzzer" "string_utilities_fuzzer") Step #3 - "compile-libfuzzer-coverage-x86_64": + declare FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel build --verbose_failures --dynamic_mode=off --spawn_strategy=standalone --genrule_strategy=standalone --strip=never --linkopt=-pthread --copt=-fsanitize=fuzzer --linkopt=-fsanitize=fuzzer --linkopt=-lc++ --conlyopt=-O1 --linkopt=-O1 --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer --conlyopt=-gline-tables-only --linkopt=-gline-tables-only --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping --conlyopt=-pthread --linkopt=-pthread --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl --conlyopt=-Wl,-lm --linkopt=-Wl,-lm --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument --cxxopt=-O1 --linkopt=-O1 --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer --cxxopt=-gline-tables-only --linkopt=-gline-tables-only --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping --cxxopt=-pthread --linkopt=-pthread --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl --cxxopt=-Wl,-lm --linkopt=-Wl,-lm --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ --cxxopt=-std=c++14 --linkopt=-std=c++14 string_escape_fuzzer string_utilities_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/12/01 06:15:11 Downloading https://releases.bazel.build/6.4.0/release/bazel-6.4.0-linux-x86_64... Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting Bazel installation... Step #3 - "compile-libfuzzer-coverage-x86_64": Starting local Bazel server and connecting to it... Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @bazel_tools; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 2 targets (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 2 targets (7 packages loaded, 6 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_jdk; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk11_linux_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...itory @remotejdk11_linux_s390x_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk17_win_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk18_macos_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_sh; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk18_linux_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...tejdk17_macos_toolchain_config_repo; starting ... (14 fetches) Step #3 - "compile-libfuzzer-coverage-x86_64":         Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @rules_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @rules_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/.../download/0.0.2/rules_cc-0.0.2.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64":    Analyzing: 2 targets (37 packages loaded, 156 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @com_google_absl//absl Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @bazel_skylib; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/.../download/1.2.1/bazel-skylib-1.2.1.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64":    Analyzing: 2 targets (53 packages loaded, 459 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Analyzed 2 targets (53 packages loaded, 517 targets configured). Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found 2 targets... Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 124] [Prepa] Creating source manifest for //:string_utilities_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": [66 / 162] 32 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/spinlock_wait.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling string_escape_fuzzer.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/civil_time_detail.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_if.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_info.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/address_is_readable.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/civil_time.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/vdso_support.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         ERROR: /root/.cache/bazel/_bazel_root/f8087e59fd95af1ae29e8fcb7ff1a3dc/external/com_google_absl/absl/synchronization/BUILD.bazel:91:11: Compiling absl/synchronization/internal/win32_waiter.cc failed: undeclared inclusion(s) in rule '@com_google_absl//absl/synchronization:synchronization': Step #3 - "compile-libfuzzer-coverage-x86_64": this rule is missing dependency declarations for the following files included by 'absl/synchronization/internal/win32_waiter.cc': Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/meta/type_traits.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/cycleclock_internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/log_severity.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/errno_saver.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/spinlock_wait.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/numeric/bits.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/numeric/int128.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/throw_delegate.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/strings/string_view.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/strings/charset.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/endian.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/strings/internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/memory/memory.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/strings/strings.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/time/internal/cctz/civil_time.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/time/internal/cctz/time_zone.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/types/bad_optional_access.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/types/optional.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/debugging/debugging_internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/debugging/demangle_internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": [67 / 162] 31 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/spinlock_wait.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling string_escape_fuzzer.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/civil_time_detail.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_if.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_info.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/address_is_readable.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/civil_time.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/vdso_support.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         INFO: Elapsed time: 9.020s, Critical Path: 0.43s Step #3 - "compile-libfuzzer-coverage-x86_64": [98 / 162] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: 98 processes: 98 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": [98 / 162] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": FAILED: Build did NOT complete successfully Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image abseil-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 abseil-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1