starting build "869c6023-5070-4e3e-8551-c87f1842e212" FETCHSOURCE BUILD Starting Step #0 Step #0: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #0: Using default tag: latest Step #0: latest: Pulling from oss-fuzz-base/base-runner Step #0: b549f31133a9: Pulling fs layer Step #0: 5fc1849ea29a: Pulling fs layer Step #0: 5bca3ba2fc7d: Pulling fs layer Step #0: fae44f6c4afb: Pulling fs layer Step #0: 6bb086a76dac: Pulling fs layer Step #0: 93d27c16d33e: Pulling fs layer Step #0: 2ed907c114e3: Pulling fs layer Step #0: c356b7427c88: Pulling fs layer Step #0: e8d856c3fdca: Pulling fs layer Step #0: 3931eca29f39: Pulling fs layer Step #0: b76e3f62a0ba: Pulling fs layer Step #0: 7bfd5336ece5: Pulling fs layer Step #0: e0b08c0fdc11: Pulling fs layer Step #0: 2846796a4416: Pulling fs layer Step #0: 6cc7e05a106e: Pulling fs layer Step #0: 6c44541c6a30: Pulling fs layer Step #0: 110ea339d19c: Pulling fs layer Step #0: 080996c25b34: Pulling fs layer Step #0: 4c9dcebec043: Pulling fs layer Step #0: 5e63b9addfd0: Pulling fs layer Step #0: 7606710857f8: Pulling fs layer Step #0: 47b62b419d91: Pulling fs layer Step #0: be88441f6a95: Pulling fs layer Step #0: 6e1d3dc39f27: Pulling fs layer Step #0: 8fd9caca2676: Pulling fs layer Step #0: 10ceb6aa6ab4: Pulling fs layer Step #0: 93d27c16d33e: Waiting Step #0: 4c9dcebec043: Waiting Step #0: 2ed907c114e3: Waiting Step #0: 5e63b9addfd0: Waiting Step #0: c356b7427c88: Waiting Step #0: e8d856c3fdca: Waiting Step #0: 7606710857f8: Waiting Step #0: 110ea339d19c: Waiting Step #0: 3931eca29f39: Waiting Step #0: 080996c25b34: Waiting Step #0: e0b08c0fdc11: Waiting Step #0: b76e3f62a0ba: Waiting Step #0: 47b62b419d91: Waiting Step #0: 2846796a4416: Waiting Step #0: 6cc7e05a106e: Waiting Step #0: be88441f6a95: Waiting Step #0: 6c44541c6a30: Waiting Step #0: 6e1d3dc39f27: Waiting Step #0: 7bfd5336ece5: Waiting Step #0: 10ceb6aa6ab4: Waiting Step #0: 8fd9caca2676: Waiting Step #0: 6bb086a76dac: Waiting Step #0: 5bca3ba2fc7d: Verifying Checksum Step #0: 5bca3ba2fc7d: Download complete Step #0: fae44f6c4afb: Verifying Checksum Step #0: fae44f6c4afb: Download complete Step #0: b549f31133a9: Verifying Checksum Step #0: b549f31133a9: Download complete Step #0: 6bb086a76dac: Verifying Checksum Step #0: 6bb086a76dac: Download complete Step #0: 93d27c16d33e: Verifying Checksum Step #0: 93d27c16d33e: Download complete Step #0: c356b7427c88: Verifying Checksum Step #0: c356b7427c88: Download complete Step #0: 2ed907c114e3: Verifying Checksum Step #0: 2ed907c114e3: Download complete Step #0: 3931eca29f39: Verifying Checksum Step #0: 3931eca29f39: Download complete Step #0: 5fc1849ea29a: Verifying Checksum Step #0: 5fc1849ea29a: Download complete Step #0: 7bfd5336ece5: Verifying Checksum Step #0: 7bfd5336ece5: Download complete Step #0: b76e3f62a0ba: Verifying Checksum Step #0: b76e3f62a0ba: Download complete Step #0: e8d856c3fdca: Verifying Checksum Step #0: e8d856c3fdca: Download complete Step #0: 2846796a4416: Verifying Checksum Step #0: 2846796a4416: Download complete Step #0: 6cc7e05a106e: Verifying Checksum Step #0: 6cc7e05a106e: Download complete Step #0: 6c44541c6a30: Verifying Checksum Step #0: 6c44541c6a30: Download complete Step #0: b549f31133a9: Pull complete Step #0: 080996c25b34: Verifying Checksum Step #0: 080996c25b34: Download complete Step #0: 110ea339d19c: Verifying Checksum Step #0: 110ea339d19c: Download complete Step #0: e0b08c0fdc11: Verifying Checksum Step #0: e0b08c0fdc11: Download complete Step #0: 5e63b9addfd0: Verifying Checksum Step #0: 5e63b9addfd0: Download complete Step #0: 7606710857f8: Verifying Checksum Step #0: 7606710857f8: Download complete Step #0: 47b62b419d91: Verifying Checksum Step #0: 47b62b419d91: Download complete Step #0: be88441f6a95: Verifying Checksum Step #0: be88441f6a95: Download complete Step #0: 8fd9caca2676: Verifying Checksum Step #0: 8fd9caca2676: Download complete Step #0: 6e1d3dc39f27: Verifying Checksum Step #0: 6e1d3dc39f27: Download complete Step #0: 4c9dcebec043: Verifying Checksum Step #0: 4c9dcebec043: Download complete Step #0: 10ceb6aa6ab4: Verifying Checksum Step #0: 10ceb6aa6ab4: Download complete Step #0: 5fc1849ea29a: Pull complete Step #0: 5bca3ba2fc7d: Pull complete Step #0: fae44f6c4afb: Pull complete Step #0: 6bb086a76dac: Pull complete Step #0: 93d27c16d33e: Pull complete Step #0: 2ed907c114e3: Pull complete Step #0: c356b7427c88: Pull complete Step #0: e8d856c3fdca: Pull complete Step #0: 3931eca29f39: Pull complete Step #0: b76e3f62a0ba: Pull complete Step #0: 7bfd5336ece5: Pull complete Step #0: e0b08c0fdc11: Pull complete Step #0: 2846796a4416: Pull complete Step #0: 6cc7e05a106e: Pull complete Step #0: 6c44541c6a30: Pull complete Step #0: 110ea339d19c: Pull complete Step #0: 080996c25b34: Pull complete Step #0: 4c9dcebec043: Pull complete Step #0: 5e63b9addfd0: Pull complete Step #0: 7606710857f8: Pull complete Step #0: 47b62b419d91: Pull complete Step #0: be88441f6a95: Pull complete Step #0: 6e1d3dc39f27: Pull complete Step #0: 8fd9caca2676: Pull complete Step #0: 10ceb6aa6ab4: Pull complete Step #0: Digest: sha256:dc299f69dfed0a7c14bd3c39c65c153824e6f98156f34438d47c59f39aa939bf Step #0: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #0: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #1: CommandException: No URLs matched: gs://oss-fuzz-coverage/tensorflow/textcov_reports/20250117/* Step #1: CommandException: 1 file/object could not be transferred. Finished Step #1 ERROR: step exited with non-zero status: 1 Starting Step #2 Step #2: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #2: total 0 Finished Step #2 Starting Step #3 Step #3: Already have image (with digest): gcr.io/cloud-builders/git Step #3: Cloning into 'oss-fuzz'... Finished Step #3 Starting Step #4 Step #4: Already have image (with digest): gcr.io/cloud-builders/docker Step #4: Sending build context to Docker daemon 16.9kB Step #4: Step 1/11 : FROM gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #4: gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e: Pulling from oss-fuzz-base/base-builder Step #4: b549f31133a9: Already exists Step #4: d993ff311503: Pulling fs layer Step #4: 5faf80b993b8: Pulling fs layer Step #4: 7946d0b643b7: Pulling fs layer Step #4: eb738e08bf3b: Pulling fs layer Step #4: 248822a2340b: Pulling fs layer Step #4: fa316482a80e: Pulling fs layer Step #4: 3393bbb458d0: Pulling fs layer Step #4: a8fda90a5506: Pulling fs layer Step #4: afcadef54a23: Pulling fs layer Step #4: 4e97a59f9033: Pulling fs layer Step #4: 4a03bd5b3e5c: Pulling fs layer Step #4: be0ac42f34b4: Pulling fs layer Step #4: 7aa9bde37b90: Pulling fs layer Step #4: 95ec4b1337ee: Pulling fs layer Step #4: 19b55f7a831c: Pulling fs layer Step #4: e9c556d304cd: Pulling fs layer Step #4: f9c1e39d9c40: Pulling fs layer Step #4: 5807a1e31ffb: Pulling fs layer Step #4: acc07ec90c58: Pulling fs layer Step #4: d143eec22c7b: Pulling fs layer Step #4: 34c38be78f62: Pulling fs layer Step #4: aa952184efec: Pulling fs layer Step #4: cb7850020c26: Pulling fs layer Step #4: 9a4eb374175f: Pulling fs layer Step #4: b453205b01ff: Pulling fs layer Step #4: fbea61822e28: Pulling fs layer Step #4: 66724beef5c1: Pulling fs layer Step #4: a204a5883dc9: Pulling fs layer Step #4: 62abd8198968: Pulling fs layer Step #4: 248822a2340b: Waiting Step #4: fa316482a80e: Waiting Step #4: eb738e08bf3b: Waiting Step #4: be0ac42f34b4: Waiting Step #4: 34c38be78f62: Waiting Step #4: aa952184efec: Waiting Step #4: 7aa9bde37b90: Waiting Step #4: fbea61822e28: Waiting Step #4: cb7850020c26: Waiting Step #4: 66724beef5c1: Waiting Step #4: 3393bbb458d0: Waiting Step #4: a8fda90a5506: Waiting Step #4: 9a4eb374175f: Waiting Step #4: 95ec4b1337ee: Waiting Step #4: 5807a1e31ffb: Waiting Step #4: 62abd8198968: Waiting Step #4: a204a5883dc9: Waiting Step #4: d143eec22c7b: Waiting Step #4: 4e97a59f9033: Waiting Step #4: b453205b01ff: Waiting Step #4: f9c1e39d9c40: Waiting Step #4: e9c556d304cd: Waiting Step #4: 5faf80b993b8: Verifying Checksum Step #4: 5faf80b993b8: Download complete Step #4: 7946d0b643b7: Verifying Checksum Step #4: 7946d0b643b7: Download complete Step #4: eb738e08bf3b: Verifying Checksum Step #4: eb738e08bf3b: Download complete Step #4: 248822a2340b: Verifying Checksum Step #4: 248822a2340b: Download complete Step #4: 3393bbb458d0: Verifying Checksum Step #4: 3393bbb458d0: Download complete Step #4: d993ff311503: Verifying Checksum Step #4: d993ff311503: Download complete Step #4: a8fda90a5506: Verifying Checksum Step #4: a8fda90a5506: Download complete Step #4: 4e97a59f9033: Verifying Checksum Step #4: 4e97a59f9033: Download complete Step #4: 4a03bd5b3e5c: Verifying Checksum Step #4: 4a03bd5b3e5c: Download complete Step #4: be0ac42f34b4: Verifying Checksum Step #4: be0ac42f34b4: Download complete Step #4: 7aa9bde37b90: Verifying Checksum Step #4: 7aa9bde37b90: Download complete Step #4: 95ec4b1337ee: Verifying Checksum Step #4: 95ec4b1337ee: Download complete Step #4: afcadef54a23: Verifying Checksum Step #4: afcadef54a23: Download complete Step #4: 19b55f7a831c: Verifying Checksum Step #4: 19b55f7a831c: Download complete Step #4: e9c556d304cd: Verifying Checksum Step #4: e9c556d304cd: Download complete Step #4: f9c1e39d9c40: Verifying Checksum Step #4: f9c1e39d9c40: Download complete Step #4: 5807a1e31ffb: Verifying Checksum Step #4: 5807a1e31ffb: Download complete Step #4: acc07ec90c58: Verifying Checksum Step #4: acc07ec90c58: Download complete Step #4: fa316482a80e: Verifying Checksum Step #4: fa316482a80e: Download complete Step #4: d993ff311503: Pull complete Step #4: 5faf80b993b8: Pull complete Step #4: d143eec22c7b: Verifying Checksum Step #4: d143eec22c7b: Download complete Step #4: 34c38be78f62: Verifying Checksum Step #4: 34c38be78f62: Download complete Step #4: cb7850020c26: Download complete Step #4: aa952184efec: Verifying Checksum Step #4: aa952184efec: Download complete Step #4: b453205b01ff: Verifying Checksum Step #4: b453205b01ff: Download complete Step #4: 9a4eb374175f: Verifying Checksum Step #4: 9a4eb374175f: Download complete Step #4: fbea61822e28: Verifying Checksum Step #4: fbea61822e28: Download complete Step #4: 66724beef5c1: Verifying Checksum Step #4: 66724beef5c1: Download complete Step #4: a204a5883dc9: Download complete Step #4: 62abd8198968: Verifying Checksum Step #4: 62abd8198968: Download complete Step #4: 7946d0b643b7: Pull complete Step #4: eb738e08bf3b: Pull complete Step #4: 248822a2340b: Pull complete Step #4: fa316482a80e: Pull complete Step #4: 3393bbb458d0: Pull complete Step #4: a8fda90a5506: Pull complete Step #4: afcadef54a23: Pull complete Step #4: 4e97a59f9033: Pull complete Step #4: 4a03bd5b3e5c: Pull complete Step #4: be0ac42f34b4: Pull complete Step #4: 7aa9bde37b90: Pull complete Step #4: 95ec4b1337ee: Pull complete Step #4: 19b55f7a831c: Pull complete Step #4: e9c556d304cd: Pull complete Step #4: f9c1e39d9c40: Pull complete Step #4: 5807a1e31ffb: Pull complete Step #4: acc07ec90c58: Pull complete Step #4: d143eec22c7b: Pull complete Step #4: 34c38be78f62: Pull complete Step #4: aa952184efec: Pull complete Step #4: cb7850020c26: Pull complete Step #4: 9a4eb374175f: Pull complete Step #4: b453205b01ff: Pull complete Step #4: fbea61822e28: Pull complete Step #4: 66724beef5c1: Pull complete Step #4: a204a5883dc9: Pull complete Step #4: 62abd8198968: Pull complete Step #4: Digest: sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #4: ---> e39a0777485f Step #4: Step 2/11 : RUN apt-get update && apt-get install -y --no-install-recommends curl rsync && apt-get clean && rm -rf /var/lib/apt/lists/* Step #4: ---> Running in f5fb0310dd83 Step #4: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #4: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #4: Get:3 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #4: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #4: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [1020 kB] Step #4: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/multiverse amd64 Packages [34.6 kB] Step #4: Get:7 http://archive.ubuntu.com/ubuntu focal-updates/multiverse i386 Packages [9592 B] Step #4: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/restricted amd64 Packages [4463 kB] Step #4: Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4661 kB] Step #4: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/restricted i386 Packages [49.0 kB] Step #4: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1320 kB] Step #4: Get:12 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1589 kB] Step #4: Get:13 http://security.ubuntu.com/ubuntu focal-security/multiverse i386 Packages [8166 B] Step #4: Get:14 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1297 kB] Step #4: Get:15 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 Packages [4276 kB] Step #4: Get:16 http://security.ubuntu.com/ubuntu focal-security/restricted i386 Packages [47.1 kB] Step #4: Get:17 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [860 kB] Step #4: Get:18 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 Packages [30.9 kB] Step #4: Get:19 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [4186 kB] Step #4: Get:20 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [1041 kB] Step #4: Fetched 25.3 MB in 2s (12.7 MB/s) Step #4: Reading package lists... Step #4: Reading package lists... Step #4: Building dependency tree... Step #4: Reading state information... Step #4: The following additional packages will be installed: Step #4: libcurl4 Step #4: Suggested packages: Step #4: openssh-server Step #4: The following packages will be upgraded: Step #4: curl libcurl4 rsync Step #4: 3 upgraded, 0 newly installed, 0 to remove and 44 not upgraded. Step #4: Need to get 719 kB of archives. Step #4: After this operation, 3072 B of additional disk space will be used. Step #4: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 rsync amd64 3.1.3-8ubuntu0.9 [323 kB] Step #4: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 curl amd64 7.68.0-1ubuntu2.25 [162 kB] Step #4: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcurl4 amd64 7.68.0-1ubuntu2.25 [235 kB] Step #4: debconf: delaying package configuration, since apt-utils is not installed Step #4: Fetched 719 kB in 1s (670 kB/s) Step #4: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #4: Preparing to unpack .../rsync_3.1.3-8ubuntu0.9_amd64.deb ... Step #4: Unpacking rsync (3.1.3-8ubuntu0.9) over (3.1.3-8ubuntu0.7) ... Step #4: Preparing to unpack .../curl_7.68.0-1ubuntu2.25_amd64.deb ... Step #4: Unpacking curl (7.68.0-1ubuntu2.25) over (7.68.0-1ubuntu2.21) ... Step #4: Preparing to unpack .../libcurl4_7.68.0-1ubuntu2.25_amd64.deb ... Step #4: Unpacking libcurl4:amd64 (7.68.0-1ubuntu2.25) over (7.68.0-1ubuntu2.21) ... Step #4: Setting up libcurl4:amd64 (7.68.0-1ubuntu2.25) ... Step #4: Setting up curl (7.68.0-1ubuntu2.25) ... Step #4: Setting up rsync (3.1.3-8ubuntu0.9) ... Step #4: invoke-rc.d: could not determine current runlevel Step #4: invoke-rc.d: policy-rc.d denied execution of restart. Step #4: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #4: Removing intermediate container f5fb0310dd83 Step #4: ---> 0ae4884277a8 Step #4: Step 3/11 : RUN python3 -m pip install numpy Step #4: ---> Running in c03c201f3ec3 Step #4: Collecting numpy Step #4: Downloading https://files.pythonhosted.org/packages/a4/9b/027bec52c633f6556dba6b722d9a0befb40498b9ceddd29cbe67a45a127c/numpy-1.24.4.tar.gz (10.9MB) Step #4: Installing build dependencies: started Step #4: Installing build dependencies: finished with status 'done' Step #4: Getting requirements to build wheel: started Step #4: Getting requirements to build wheel: finished with status 'done' Step #4: Preparing wheel metadata: started Step #4: Preparing wheel metadata: finished with status 'done' Step #4: Building wheels for collected packages: numpy Step #4: Building wheel for numpy (PEP 517): started Step #4: Building wheel for numpy (PEP 517): still running... Step #4: Building wheel for numpy (PEP 517): finished with status 'done' Step #4: Created wheel for numpy: filename=numpy-1.24.4-cp38-cp38-linux_x86_64.whl size=9719865 sha256=0582577841ac3e22573925aeef4154ff88f7f42f3b23896ecb91a1a39221df06 Step #4: Stored in directory: /root/.cache/pip/wheels/9f/b7/f4/38166ec6c7757984ef41e3f6594015395049bff59851c060ae Step #4: Successfully built numpy Step #4: Installing collected packages: numpy Step #4: Successfully installed numpy-1.24.4 Step #4: WARNING: You are using pip version 19.2.3, however version 24.3.1 is available. Step #4: You should consider upgrading via the 'pip install --upgrade pip' command. Step #4: Removing intermediate container c03c201f3ec3 Step #4: ---> 04740d9e6450 Step #4: Step 4/11 : RUN ln -s /usr/local/bin/python3 /usr/local/bin/python Step #4: ---> Running in 911483f8065d Step #4: Removing intermediate container 911483f8065d Step #4: ---> 3f1d966a0b9e Step #4: Step 5/11 : RUN curl -Lo /usr/bin/bazel https://github.com/bazelbuild/bazelisk/releases/download/v1.1.0/bazelisk-linux-amd64 && chmod +x /usr/bin/bazel Step #4: ---> Running in 3bcc8981e8ec Step #4:  % Total % Received % Xferd Average Speed Time Time Time Current Step #4: Dload Upload Total Spent Left Speed Step #4: 0 0 0 0 0 0 0  0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #4:  100 6036k 100 6036k 0 0 15.2M 0 --:--:-- --:--:-- --:--:-- 15.2M Step #4: Removing intermediate container 3bcc8981e8ec Step #4: ---> 024f920e7cbe Step #4: Step 6/11 : ENV JAVA_HOME /usr/lib/jvm/java-15-openjdk-amd64 Step #4: ---> Running in 61e59670eb6d Step #4: Removing intermediate container 61e59670eb6d Step #4: ---> 20b339f21e9f Step #4: Step 7/11 : RUN install_java.sh || true Step #4: ---> Running in 2dbe8292efde Step #4: + cd /tmp Step #4: + curl --silent -L -O https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-x64_bin.tar.gz Step #4: + mkdir -p /usr/lib/jvm/java-15-openjdk-amd64 Step #4: + tar -xz --strip-components=1 -f openjdk-15.0.2_linux-x64_bin.tar.gz --directory /usr/lib/jvm/java-15-openjdk-amd64 Step #4: + rm -f openjdk-15.0.2_linux-x64_bin.tar.gz Step #4: + rm -rf /usr/lib/jvm/java-15-openjdk-amd64/jmods /usr/lib/jvm/java-15-openjdk-amd64/lib/src.zip Step #4: + cd /src/ Step #4: + git clone https://github.com/CodeIntelligenceTesting/jazzer Step #4: Cloning into 'jazzer'... Step #4: + cd jazzer Step #4: + git checkout 96205feebc7135075ffa48aae3f22e38cae5dc45 Step #4: Note: switching to '96205feebc7135075ffa48aae3f22e38cae5dc45'. Step #4: Step #4: You are in 'detached HEAD' state. You can look around, make experimental Step #4: changes and commit them, and you can discard any commits you make in this Step #4: state without impacting any branches by switching back to a branch. Step #4: Step #4: If you want to create a new branch to retain commits you create, you may Step #4: do so (now or later) by using -c with the switch command. Example: Step #4: Step #4: git switch -c Step #4: Step #4: Or undo this operation with: Step #4: Step #4: git switch - Step #4: Step #4: Turn off this advice by setting config variable advice.detachedHead to false Step #4: Step #4: HEAD is now at 96205fee build: update toolchains_llvm dependency Step #4: + cat Step #4: + bazel build //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar //deploy:jazzer-api //launcher:jazzer Step #4: 2025/01/17 10:08:20 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #4: 2025/01/17 10:08:20 Downloading https://storage.googleapis.com/bazel-builds/artifacts/ubuntu1404/1f12a4d8f82efa3eac5e1a708833e8ed53e54327/bazel... Step #4: Extracting Bazel installation... Step #4: Starting local Bazel server and connecting to it... Step #4: Computing main repo mapping: Step #4: Computing main repo mapping: Step #4: Computing main repo mapping: Step #4: Computing main repo mapping: Step #4: DEBUG: /root/.cache/bazel/_bazel_root/e3c2be7f6be7a238950c8073a90fc93c/external/rules_jvm_external/coursier.bzl:445:18: WARNING: rules_jvm_external_deps_install.json contains an outdated input signature. It is recommended that you regenerate it by running either: Step #4: REPIN=1 bazel run @unpinned_rules_jvm_external_deps//:pin Step #4: or: Step #4: 1) Set 'fail_if_repin_required' to 'False' in 'maven_install' Step #4: 2) Run 'bazel run @unpinned_rules_jvm_external_deps//:pin' Step #4: 3) Reset 'fail_if_repin_required' to 'True' in 'maven_install' Step #4: Step #4: Computing main repo mapping: Step #4: Computing main repo mapping: Step #4: Loading: Step #4: Loading: 0 packages loaded Step #4: Analyzing: 3 targets (3 packages loaded, 0 targets configured) Step #4: Analyzing: 3 targets (3 packages loaded, 0 targets configured) Step #4: [0 / 1] checking cached actions Step #4: Analyzing: 3 targets (49 packages loaded, 10 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (136 packages loaded, 987 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8276 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (143 packages loaded, 8278 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (144 packages loaded, 8326 targets configured) Step #4: [1 / 1] checking cached actions Step #4: Analyzing: 3 targets (144 packages loaded, 8326 targets configured) Step #4: [1 / 1] checking cached actions Step #4: INFO: Analyzed 3 targets (154 packages loaded, 10190 targets configured). Step #4: [50 / 360] Extracting interface for jar external/jvm__jarjar_abrams_assembly/jar/downloaded.jar [for tool]; 0s processwrapper-sandbox ... (32 actions running) Step #4: [53 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/sanitizer_symbols.cpp; 1s processwrapper-sandbox ... (32 actions running) Step #4: [55 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/sanitizer_symbols.cpp; 3s processwrapper-sandbox ... (32 actions, 30 running) Step #4: [60 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/sanitizer_symbols.cpp; 5s processwrapper-sandbox ... (32 actions running) Step #4: [61 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/sanitizer_symbols.cpp; 6s processwrapper-sandbox ... (32 actions running) Step #4: [62 / 360] Compiling absl/base/internal/spinlock.cc; 7s processwrapper-sandbox ... (32 actions running) Step #4: [64 / 360] Compiling absl/base/internal/spinlock.cc; 8s processwrapper-sandbox ... (32 actions running) Step #4: [72 / 360] Compiling absl/base/internal/spinlock.cc; 9s processwrapper-sandbox ... (32 actions running) Step #4: [84 / 360] Compiling absl/base/internal/sysinfo.cc; 10s processwrapper-sandbox ... (29 actions running) Step #4: [100 / 360] Compiling absl/strings/numbers.cc; 11s processwrapper-sandbox ... (31 actions running) Step #4: [115 / 360] Building external/com_github_classgraph_classgraph/libclassgraph.jar (140 source files); 7s multiplex-worker ... (32 actions, 31 running) Step #4: [124 / 360] Compiling FuzzerDriver.cpp; 4s processwrapper-sandbox ... (31 actions running) Step #4: [147 / 360] Compiling FuzzerDriver.cpp; 5s processwrapper-sandbox ... (32 actions, 31 running) Step #4: [167 / 360] Compiling FuzzerDriver.cpp; 6s processwrapper-sandbox ... (32 actions, 31 running) Step #4: INFO: From Building external/com_github_jhalterman_typetools/libtypetools.jar (2 source files): Step #4: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:34: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #4: import java.security.AccessController; Step #4: ^ Step #4: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:68: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #4: final Unsafe unsafe = AccessController.doPrivileged(new PrivilegedExceptionAction() { Step #4: ^ Step #4: [189 / 360] Compiling Java headers external/rules_jvm_external/private/tools/java/com/github/bazelbuild/rules_jvm_external/librules_jvm_external-hjar.jar (4 source files) [for tool]; 3s processwrapper-sandbox ... (24 actions, 23 running) Step #4: [192 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 3s worker ... (31 actions, 30 running) Step #4: [196 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 4s worker ... (30 actions, 29 running) Step #4: [199 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 6s worker ... (29 actions running) Step #4: [203 / 360] Merging Kotlin output jar //src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher (Runtime) from 1 inputs; 7s processwrapper-sandbox ... (27 actions running) Step #4: [205 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/utils/libzip_utils-hjar.jar (1 source file); 7s processwrapper-sandbox ... (25 actions running) Step #4: [208 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/driver/libopt_item-hjar.jar (1 source file); 8s processwrapper-sandbox ... (22 actions running) Step #4: [218 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/utils/liblog-hjar.jar (1 source file); 9s processwrapper-sandbox ... (17 actions running) Step #4: [243 / 360] Compiling Java headers external/com_github_classgraph_classgraph/libclassgraph-hjar.jar (140 source files); 10s processwrapper-sandbox ... (7 actions, 6 running) Step #4: [263 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 2s worker ... (18 actions, 17 running) Step #4: [291 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 4s worker ... (14 actions, 12 running) Step #4: [310 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/fuzz_target_runner.cpp; 2s processwrapper-sandbox ... (10 actions running) Step #4: [323 / 360] Compiling src/main/native/com/code_intelligence/jazzer/driver/libfuzzer_callbacks.cpp; 3s processwrapper-sandbox ... (6 actions running) Step #4: [329 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 2s worker ... (3 actions running) Step #4: [334 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 4s worker Step #4: [340 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/driver/libfuzz_target_runner_remove_this_part_-hjar.jar (1 source file); 0s processwrapper-sandbox ... (2 actions running) Step #4: [343 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/agent:agent_lib { kt: 3, java: 1, srcjars: 0 } for k8; 1s worker Step #4: [351 / 360] [Prepa] Compiling Java headers src/main/java/com/code_intelligence/jazzer/driver/liboffline_instrumentor-hjar.jar (1 source file) Step #4: [355 / 360] [Prepa] Building src/main/java/com/code_intelligence/jazzer/libjazzer_lib.jar (1 source file) Step #4: [357 / 360] jarjar @//src/main/java/com/code_intelligence/jazzer:jazzer_shaded; 1s processwrapper-sandbox Step #4: [358 / 360] [Prepa] Action src/main/java/com/code_intelligence/jazzer/jazzer.jar Step #4: INFO: Found 3 targets... Step #4: INFO: Elapsed time: 148.501s, Critical Path: 35.65s Step #4: INFO: 360 processes: 36 internal, 239 processwrapper-sandbox, 85 worker. Step #4: INFO: Build completed successfully, 360 total actions Step #4: ++ bazel cquery --output=files //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar Step #4: 2025/01/17 10:10:50 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #4: Computing main repo mapping: Step #4: Loading: Step #4: Loading: 0 packages loaded Step #4: Analyzing: target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured) Step #4: INFO: Analyzed target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured). Step #4: INFO: Found 1 target... Step #4: INFO: Elapsed time: 0.286s, Critical Path: 0.00s Step #4: INFO: 0 processes. Step #4: INFO: Build completed successfully, 0 total actions Step #4: + cp bazel-out/k8-opt/bin/src/main/java/com/code_intelligence/jazzer/jazzer_standalone_deploy.jar /usr/local/bin/jazzer_agent_deploy.jar Step #4: ++ bazel cquery --output=files //launcher:jazzer Step #4: 2025/01/17 10:10:50 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #4: Computing main repo mapping: Step #4: Loading: Step #4: Loading: 0 packages loaded Step #4: Analyzing: target //launcher:jazzer (0 packages loaded, 0 targets configured) Step #4: INFO: Analyzed target //launcher:jazzer (0 packages loaded, 0 targets configured). Step #4: INFO: Found 1 target... Step #4: INFO: Elapsed time: 0.182s, Critical Path: 0.00s Step #4: INFO: 0 processes. Step #4: INFO: Build completed successfully, 0 total actions Step #4: + cp bazel-out/k8-opt/bin/launcher/jazzer /usr/local/bin/jazzer_driver Step #4: ++ bazel cquery --output=files //deploy:jazzer-api Step #4: 2025/01/17 10:10:51 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #4: Computing main repo mapping: Step #4: Loading: Step #4: Loading: 0 packages loaded Step #4: Analyzing: target //deploy:jazzer-api (0 packages loaded, 0 targets configured) Step #4: INFO: Analyzed target //deploy:jazzer-api (0 packages loaded, 0 targets configured). Step #4: INFO: Found 1 target... Step #4: INFO: Elapsed time: 0.173s, Critical Path: 0.00s Step #4: INFO: 0 processes. Step #4: INFO: Build completed successfully, 0 total actions Step #4: /usr/local/bin/install_java.sh: line 44: JAZZER_API_PATH: unbound variable Step #4: Removing intermediate container 2dbe8292efde Step #4: ---> a0025e4c6142 Step #4: Step 8/11 : RUN git clone --depth 1 https://github.com/tensorflow/tensorflow tensorflow Step #4: ---> Running in 5bb038160fc2 Step #4: Cloning into 'tensorflow'... Step #4: Updating files: 38% (13445/34636) Updating files: 39% (13509/34636) Updating files: 40% (13855/34636) Updating files: 41% (14201/34636) Updating files: 42% (14548/34636) Updating files: 43% (14894/34636) Updating files: 44% (15240/34636) Updating files: 45% (15587/34636) Updating files: 46% (15933/34636) Updating files: 47% (16279/34636) Updating files: 48% (16626/34636) Updating files: 49% (16972/34636) Updating files: 50% (17318/34636) Updating files: 51% (17665/34636) Updating files: 52% (18011/34636) Updating files: 53% (18358/34636) Updating files: 54% (18704/34636) Updating files: 55% (19050/34636) Updating files: 56% (19397/34636) Updating files: 57% (19743/34636) Updating files: 58% (20089/34636) Updating files: 59% (20436/34636) Updating files: 60% (20782/34636) Updating files: 61% (21128/34636) Updating files: 62% (21475/34636) Updating files: 63% (21821/34636) Updating files: 64% (22168/34636) Updating files: 65% (22514/34636) Updating files: 66% (22860/34636) Updating files: 67% (23207/34636) Updating files: 68% (23553/34636) Updating files: 69% (23899/34636) Updating files: 70% (24246/34636) Updating files: 71% (24592/34636) Updating files: 72% (24938/34636) Updating files: 72% (25072/34636) Updating files: 73% (25285/34636) Updating files: 74% (25631/34636) Updating files: 75% (25977/34636) Updating files: 76% (26324/34636) Updating files: 77% (26670/34636) Updating files: 78% (27017/34636) Updating files: 79% (27363/34636) Updating files: 80% (27709/34636) Updating files: 81% (28056/34636) Updating files: 82% (28402/34636) Updating files: 83% (28748/34636) Updating files: 84% (29095/34636) Updating files: 85% (29441/34636) Updating files: 86% (29787/34636) Updating files: 87% (30134/34636) Updating files: 88% (30480/34636) Updating files: 89% (30827/34636) Updating files: 90% (31173/34636) Updating files: 91% (31519/34636) Updating files: 92% (31866/34636) Updating files: 93% (32212/34636) Updating files: 94% (32558/34636) Updating files: 95% (32905/34636) Updating files: 96% (33251/34636) Updating files: 97% (33597/34636) Updating files: 98% (33944/34636) Updating files: 99% (34290/34636) Updating files: 100% (34636/34636) Updating files: 100% (34636/34636), done. Step #4: Removing intermediate container 5bb038160fc2 Step #4: ---> 0437ed247ee8 Step #4: Step 9/11 : WORKDIR $SRC/tensorflow Step #4: ---> Running in fe1337052b7f Step #4: Removing intermediate container fe1337052b7f Step #4: ---> a52f4b3f7023 Step #4: Step 10/11 : COPY build.sh $SRC/ Step #4: ---> ef688c2778f1 Step #4: Step 11/11 : COPY *.patch $SRC/ Step #4: ---> 4ed8f019bf0d Step #4: Successfully built 4ed8f019bf0d Step #4: Successfully tagged gcr.io/oss-fuzz/tensorflow:latest Finished Step #4 Starting Step #5 - "srcmap" Step #5 - "srcmap": Already have image: gcr.io/oss-fuzz/tensorflow Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + SRCMAP=/tmp/filePvoNWP Step #5 - "srcmap": + echo '{}' Step #5 - "srcmap": + PATHS_TO_SCAN=/src Step #5 - "srcmap": + [[ c++ == \g\o ]] Step #5 - "srcmap": ++ find /src -name .git -type d Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/tensorflow/.git Step #5 - "srcmap": + GIT_DIR=/src/tensorflow Step #5 - "srcmap": + cd /src/tensorflow Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/tensorflow/tensorflow Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=1a6487a9706317ffc19b39592b257afbc26f40d5 Step #5 - "srcmap": + jq_inplace /tmp/filePvoNWP '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "1a6487a9706317ffc19b39592b257afbc26f40d5" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/fileYyJJDb Step #5 - "srcmap": + cat /tmp/filePvoNWP Step #5 - "srcmap": + jq '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "1a6487a9706317ffc19b39592b257afbc26f40d5" }' Step #5 - "srcmap": + mv /tmp/fileYyJJDb /tmp/filePvoNWP Step #5 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #5 - "srcmap": ++ dirname /src/jazzer/.git Step #5 - "srcmap": + GIT_DIR=/src/jazzer Step #5 - "srcmap": + cd /src/jazzer Step #5 - "srcmap": ++ git config --get remote.origin.url Step #5 - "srcmap": + GIT_URL=https://github.com/CodeIntelligenceTesting/jazzer Step #5 - "srcmap": ++ git rev-parse HEAD Step #5 - "srcmap": + GIT_REV=96205feebc7135075ffa48aae3f22e38cae5dc45 Step #5 - "srcmap": + jq_inplace /tmp/filePvoNWP '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "96205feebc7135075ffa48aae3f22e38cae5dc45" }' Step #5 - "srcmap": ++ tempfile Step #5 - "srcmap": + F=/tmp/fileABP9KH Step #5 - "srcmap": + cat /tmp/filePvoNWP Step #5 - "srcmap": + jq '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "96205feebc7135075ffa48aae3f22e38cae5dc45" }' Step #5 - "srcmap": + mv /tmp/fileABP9KH /tmp/filePvoNWP Step #5 - "srcmap": ++ find /src -name .svn -type d Step #5 - "srcmap": ++ find /src -name .hg -type d Step #5 - "srcmap": + '[' '' '!=' '' ']' Step #5 - "srcmap": + cat /tmp/filePvoNWP Step #5 - "srcmap": + rm /tmp/filePvoNWP Step #5 - "srcmap": { Step #5 - "srcmap": "/src/tensorflow": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/tensorflow/tensorflow", Step #5 - "srcmap": "rev": "1a6487a9706317ffc19b39592b257afbc26f40d5" Step #5 - "srcmap": }, Step #5 - "srcmap": "/src/jazzer": { Step #5 - "srcmap": "type": "git", Step #5 - "srcmap": "url": "https://github.com/CodeIntelligenceTesting/jazzer", Step #5 - "srcmap": "rev": "96205feebc7135075ffa48aae3f22e38cae5dc45" Step #5 - "srcmap": } Step #5 - "srcmap": } Finished Step #5 - "srcmap" Starting Step #6 - "compile-libfuzzer-introspector-x86_64" Step #6 - "compile-libfuzzer-introspector-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": vm.mmap_rnd_bits = 28 Step #6 - "compile-libfuzzer-introspector-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": CC=clang Step #6 - "compile-libfuzzer-introspector-x86_64": CXX=clang++ Step #6 - "compile-libfuzzer-introspector-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -g Step #6 - "compile-libfuzzer-introspector-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -O0 -flto -fno-inline-functions -fuse-ld=gold -Wno-unused-command-line-argument -fsanitize=fuzzer-no-link -stdlib=libc++ -g Step #6 - "compile-libfuzzer-introspector-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=introspector -Cdebuginfo=1 -Cforce-frame-pointers Step #6 - "compile-libfuzzer-introspector-x86_64": --------------------------------------------------------------- Step #6 - "compile-libfuzzer-introspector-x86_64": + git apply --ignore-space-change --ignore-whitespace /src/fuzz_patch.patch Step #6 - "compile-libfuzzer-introspector-x86_64": error: patch failed: tensorflow/security/fuzzing/cc/BUILD:55 Step #6 - "compile-libfuzzer-introspector-x86_64": error: tensorflow/security/fuzzing/cc/BUILD: patch does not apply Step #6 - "compile-libfuzzer-introspector-x86_64": ******************************************************************************** Step #6 - "compile-libfuzzer-introspector-x86_64": Failed to build. Step #6 - "compile-libfuzzer-introspector-x86_64": To reproduce, run: Step #6 - "compile-libfuzzer-introspector-x86_64": python infra/helper.py build_image tensorflow Step #6 - "compile-libfuzzer-introspector-x86_64": python infra/helper.py build_fuzzers --sanitizer introspector --engine libfuzzer --architecture x86_64 tensorflow Step #6 - "compile-libfuzzer-introspector-x86_64": ******************************************************************************** Finished Step #6 - "compile-libfuzzer-introspector-x86_64" ERROR: step exited with non-zero status: 1 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: CommandException: 1 files/objects could not be removed. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: Step #8: ***** NOTICE ***** Step #8: Step #8: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #8: platforms, can be found at Step #8: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #8: Step #8: Suggested alternative images include: Step #8: Step #8: gcr.io/google.com/cloudsdktool/cloud-sdk Step #8: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #8: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #8: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #8: Step #8: Please note that the `gsutil` entrypoint must be specified when using these Step #8: images. Step #8: Step #8: ***** END OF NOTICE ***** Step #8: Step #8: CommandException: No URLs matched: /workspace/out/libfuzzer-introspector-x86_64/inspector Step #8: CommandException: 1 file/object could not be transferred. Finished Step #8 ERROR ERROR: build step 8 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1