starting build "8757d2f0-3569-4d43-be3e-cb7d07f7b73c" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 9.728kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: ee06c35af532: Pulling fs layer Step #1: c36614e90b60: Pulling fs layer Step #1: f7916c9a38bf: Pulling fs layer Step #1: 45aba247b141: Pulling fs layer Step #1: 3373c7ec2037: Pulling fs layer Step #1: 75f33f8f2070: Pulling fs layer Step #1: 7ca928a6e048: Pulling fs layer Step #1: d63773318bc1: Pulling fs layer Step #1: d48cd156a215: Pulling fs layer Step #1: f825c78807d7: Pulling fs layer Step #1: 23baad8ed203: Pulling fs layer Step #1: 44ab4bfa873a: Pulling fs layer Step #1: 9627a9a2b1ad: Pulling fs layer Step #1: 58babef70f1b: Pulling fs layer Step #1: 76cfe82852de: Pulling fs layer Step #1: ae84697013da: Pulling fs layer Step #1: b720c9261036: Pulling fs layer Step #1: 2e43624579d5: Pulling fs layer Step #1: eb77aa496973: Pulling fs layer Step #1: 82414ded40c6: Pulling fs layer Step #1: c58796fec269: Pulling fs layer Step #1: 413d06e26590: Pulling fs layer Step #1: 7bd5e0879902: Pulling fs layer Step #1: 1e47901c4623: Pulling fs layer Step #1: 78311f612a03: Pulling fs layer Step #1: 09b5d9ecfd69: Pulling fs layer Step #1: f7916c9a38bf: Waiting Step #1: 45aba247b141: Waiting Step #1: 79b30ddeffc0: Pulling fs layer Step #1: 9627a9a2b1ad: Waiting Step #1: 3373c7ec2037: Waiting Step #1: 3271cdcf1f7c: Pulling fs layer Step #1: 66a39d43e4df: Pulling fs layer Step #1: 75f33f8f2070: Waiting Step #1: 58babef70f1b: Waiting Step #1: 2e43624579d5: Waiting Step #1: b720c9261036: Waiting Step #1: ae84697013da: Waiting Step #1: eb77aa496973: Waiting Step #1: 82414ded40c6: Waiting Step #1: c58796fec269: Waiting Step #1: 09b5d9ecfd69: Waiting Step #1: 413d06e26590: Waiting Step #1: 23baad8ed203: Waiting Step #1: 79b30ddeffc0: Waiting Step #1: 7ca928a6e048: Waiting Step #1: d63773318bc1: Waiting Step #1: 3271cdcf1f7c: Waiting Step #1: d48cd156a215: Waiting Step #1: 66a39d43e4df: Waiting Step #1: 78311f612a03: Waiting Step #1: 1e47901c4623: Waiting Step #1: 76cfe82852de: Waiting Step #1: 44ab4bfa873a: Waiting Step #1: 7bd5e0879902: Waiting Step #1: c36614e90b60: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f7916c9a38bf: Verifying Checksum Step #1: f7916c9a38bf: Download complete Step #1: 45aba247b141: Verifying Checksum Step #1: 45aba247b141: Download complete Step #1: 3373c7ec2037: Verifying Checksum Step #1: 3373c7ec2037: Download complete Step #1: 7ca928a6e048: Verifying Checksum Step #1: 7ca928a6e048: Download complete Step #1: d63773318bc1: Download complete Step #1: ee06c35af532: Verifying Checksum Step #1: ee06c35af532: Download complete Step #1: f825c78807d7: Verifying Checksum Step #1: f825c78807d7: Download complete Step #1: 23baad8ed203: Verifying Checksum Step #1: 23baad8ed203: Download complete Step #1: 44ab4bfa873a: Verifying Checksum Step #1: 44ab4bfa873a: Download complete Step #1: 9627a9a2b1ad: Verifying Checksum Step #1: 9627a9a2b1ad: Download complete Step #1: 58babef70f1b: Verifying Checksum Step #1: 58babef70f1b: Download complete Step #1: 76cfe82852de: Verifying Checksum Step #1: 76cfe82852de: Download complete Step #1: b549f31133a9: Pull complete Step #1: ae84697013da: Verifying Checksum Step #1: ae84697013da: Download complete Step #1: b720c9261036: Verifying Checksum Step #1: b720c9261036: Download complete Step #1: 2e43624579d5: Verifying Checksum Step #1: 2e43624579d5: Download complete Step #1: eb77aa496973: Verifying Checksum Step #1: eb77aa496973: Download complete Step #1: 82414ded40c6: Verifying Checksum Step #1: 82414ded40c6: Download complete Step #1: d48cd156a215: Verifying Checksum Step #1: d48cd156a215: Download complete Step #1: 413d06e26590: Verifying Checksum Step #1: 413d06e26590: Download complete Step #1: c58796fec269: Verifying Checksum Step #1: c58796fec269: Download complete Step #1: 7bd5e0879902: Verifying Checksum Step #1: 7bd5e0879902: Download complete Step #1: 1e47901c4623: Verifying Checksum Step #1: 1e47901c4623: Download complete Step #1: 78311f612a03: Verifying Checksum Step #1: 78311f612a03: Download complete Step #1: 09b5d9ecfd69: Verifying Checksum Step #1: 09b5d9ecfd69: Download complete Step #1: 79b30ddeffc0: Download complete Step #1: 3271cdcf1f7c: Verifying Checksum Step #1: 3271cdcf1f7c: Download complete Step #1: 66a39d43e4df: Verifying Checksum Step #1: 66a39d43e4df: Download complete Step #1: 75f33f8f2070: Verifying Checksum Step #1: 75f33f8f2070: Download complete Step #1: ee06c35af532: Pull complete Step #1: c36614e90b60: Pull complete Step #1: f7916c9a38bf: Pull complete Step #1: 45aba247b141: Pull complete Step #1: 3373c7ec2037: Pull complete Step #1: 75f33f8f2070: Pull complete Step #1: 7ca928a6e048: Pull complete Step #1: d63773318bc1: Pull complete Step #1: d48cd156a215: Pull complete Step #1: f825c78807d7: Pull complete Step #1: 23baad8ed203: Pull complete Step #1: 44ab4bfa873a: Pull complete Step #1: 9627a9a2b1ad: Pull complete Step #1: 58babef70f1b: Pull complete Step #1: 76cfe82852de: Pull complete Step #1: ae84697013da: Pull complete Step #1: b720c9261036: Pull complete Step #1: 2e43624579d5: Pull complete Step #1: eb77aa496973: Pull complete Step #1: 82414ded40c6: Pull complete Step #1: c58796fec269: Pull complete Step #1: 413d06e26590: Pull complete Step #1: 7bd5e0879902: Pull complete Step #1: 1e47901c4623: Pull complete Step #1: 78311f612a03: Pull complete Step #1: 09b5d9ecfd69: Pull complete Step #1: 79b30ddeffc0: Pull complete Step #1: 3271cdcf1f7c: Pull complete Step #1: 66a39d43e4df: Pull complete Step #1: Digest: sha256:d138a2357c04b5f9224cb9fddbd0d7c93493af3ff70861cece769de5878993e5 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> ac9fe2ae38ad Step #1: Step 2/7 : RUN git clone --depth 1 https://github.com/census-instrumentation/opencensus-cpp Step #1: ---> Running in 9030428f19dc Step #1: Cloning into 'opencensus-cpp'... Step #1: Removing intermediate container 9030428f19dc Step #1: ---> f1816721811a Step #1: Step 3/7 : COPY WORKSPACE .bazelrc $SRC/ Step #1: ---> a0e6a22c2f74 Step #1: Step 4/7 : RUN cat WORKSPACE >> $SRC/opencensus-cpp/WORKSPACE Step #1: ---> Running in 5b8a0328e32e Step #1: Removing intermediate container 5b8a0328e32e Step #1: ---> 9180cad2cd90 Step #1: Step 5/7 : RUN cat .bazelrc >> $SRC/opencensus-cpp/.bazelrc Step #1: ---> Running in f867cfe3451d Step #1: Removing intermediate container f867cfe3451d Step #1: ---> 5979a6f329ef Step #1: Step 6/7 : COPY build.sh $SRC/ Step #1: ---> 3780f871ba23 Step #1: Step 7/7 : WORKDIR $SRC/opencensus-cpp Step #1: ---> Running in 0ad69b1fb5af Step #1: Removing intermediate container 0ad69b1fb5af Step #1: ---> cef2f6917469 Step #1: Successfully built cef2f6917469 Step #1: Successfully tagged gcr.io/oss-fuzz/opencensus-cpp:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/opencensus-cpp Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filejLPDUM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/opencensus-cpp/.git Step #2 - "srcmap": + GIT_DIR=/src/opencensus-cpp Step #2 - "srcmap": + cd /src/opencensus-cpp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/census-instrumentation/opencensus-cpp Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=50eb5de762e5f87e206c011a4f930adb1a1775b1 Step #2 - "srcmap": + jq_inplace /tmp/filejLPDUM '."/src/opencensus-cpp" = { type: "git", url: "https://github.com/census-instrumentation/opencensus-cpp", rev: "50eb5de762e5f87e206c011a4f930adb1a1775b1" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileD7e78a Step #2 - "srcmap": + cat /tmp/filejLPDUM Step #2 - "srcmap": + jq '."/src/opencensus-cpp" = { type: "git", url: "https://github.com/census-instrumentation/opencensus-cpp", rev: "50eb5de762e5f87e206c011a4f930adb1a1775b1" }' Step #2 - "srcmap": + mv /tmp/fileD7e78a /tmp/filejLPDUM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filejLPDUM Step #2 - "srcmap": + rm /tmp/filejLPDUM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/opencensus-cpp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/census-instrumentation/opencensus-cpp", Step #2 - "srcmap": "rev": "50eb5de762e5f87e206c011a4f930adb1a1775b1" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + ln -sf /usr/local/bin/python3 /usr/bin/python3 Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + git grep cc_fuzz_target.bzl Step #3 - "compile-libfuzzer-coverage-x86_64": + grep BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + cut -d: -f1 Step #3 - "compile-libfuzzer-coverage-x86_64": + uniq Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s=//bazel:cc_fuzz_target.bzl=@rules_fuzzing//fuzzing:cc_defs.bzl= opencensus/tags/BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s=//bazel:cc_fuzz_target.bzl=@rules_fuzzing//fuzzing:cc_defs.bzl= opencensus/trace/BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + git grep 'fuzz_target(' Step #3 - "compile-libfuzzer-coverage-x86_64": + grep BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + cut -d: -f1 Step #3 - "compile-libfuzzer-coverage-x86_64": + uniq Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/fuzz_target/fuzz_test/ opencensus/tags/BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/fuzz_target/fuzz_test/ opencensus/trace/BUILD Step #3 - "compile-libfuzzer-coverage-x86_64": + read i Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel_build_fuzz_tests Step #3 - "compile-libfuzzer-coverage-x86_64": Using Bazel query to find fuzz targets: Step #3 - "compile-libfuzzer-coverage-x86_64": let all_fuzz_tests = attr(tags, "fuzz-test", "//...") in Step #3 - "compile-libfuzzer-coverage-x86_64": let lang_fuzz_tests = attr(generator_function, "^cc_fuzz_test$", $all_fuzz_tests) in Step #3 - "compile-libfuzzer-coverage-x86_64": $lang_fuzz_tests - attr(tags, "no-oss-fuzz", $lang_fuzz_tests) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/11/20 07:23:14 Downloading https://releases.bazel.build/6.4.0/release/bazel-6.4.0-linux-x86_64... Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting Bazel installation... Step #3 - "compile-libfuzzer-coverage-x86_64": Starting local Bazel server and connecting to it... Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Rule 'com_github_grpc_grpc' indicated that a canonical reproducible form can be obtained by modifying arguments sha256 = "ffcf5e45773dcb8f5e256ffa73c79ef4b40a19c79aef4d12e2fe33893f61cba8" Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Repository com_github_grpc_grpc instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/WORKSPACE:20:20: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/bazel/deps.bzl:24:10: in opencensus_cpp_deps Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Rule 'com_google_googleapis' indicated that a canonical reproducible form can be obtained by modifying arguments sha256 = "c0a5f20b6f01f391aff9068ff049a47c377231eb27098c78150bc80838b607b7" Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Repository com_google_googleapis instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/WORKSPACE:20:20: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/bazel/deps.bzl:58:10: in opencensus_cpp_deps Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Rule 'com_github_jupp0r_prometheus_cpp' indicated that a canonical reproducible form can be obtained by modifying arguments sha256 = "d3aa107f410a3ab9fccbdb2a00d9de05a03036c8619ab45f6471e0033d4d2d35" Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Repository com_github_jupp0r_prometheus_cpp instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/WORKSPACE:20:20: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/bazel/deps.bzl:32:10: in opencensus_cpp_deps Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Rule 'bazel_skylib' indicated that a canonical reproducible form can be obtained by modifying arguments sha256 = "60e7e6370d99bd90ad4b3b873f136b3376c205be484c4fdcd5fff45e3be7d25d" Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Repository bazel_skylib instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/WORKSPACE:20:20: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/bazel/deps.bzl:16:10: in opencensus_cpp_deps Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/rules_python/python/pip.bzl:48:10: pip_install is deprecated. Please switch to pip_parse. pip_install will be removed in a future release. Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Rule 'com_google_absl' indicated that a canonical reproducible form can be obtained by modifying arguments sha256 = "c6eb34c360875baba35d35fa7c455186b217d968c889713fead213c6ff03b8f2" Step #3 - "compile-libfuzzer-coverage-x86_64": DEBUG: Repository com_google_absl instantiated at: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/WORKSPACE:20:20: in Step #3 - "compile-libfuzzer-coverage-x86_64": /src/opencensus-cpp/bazel/deps.bzl:8:10: in opencensus_cpp_deps Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/utils.bzl:233:18: in maybe Step #3 - "compile-libfuzzer-coverage-x86_64": Repository rule http_archive defined at: Step #3 - "compile-libfuzzer-coverage-x86_64": /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/bazel_tools/tools/build_defs/repo/http.bzl:372:31: in Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 23 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Found 5 fuzz test packages: Step #3 - "compile-libfuzzer-coverage-x86_64": //opencensus/tags:grpc_tags_bin_fuzzer_oss_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //opencensus/trace:b3_fuzzer_oss_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //opencensus/trace:cloud_trace_context_fuzzer_oss_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //opencensus/trace:grpc_trace_bin_fuzzer_oss_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": //opencensus/trace:trace_context_fuzzer_oss_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": Building the fuzz tests with the following Bazel options: Step #3 - "compile-libfuzzer-coverage-x86_64": -c opt --@rules_fuzzing//fuzzing:cc_engine=@rules_fuzzing_oss_fuzz//:oss_fuzz_engine --@rules_fuzzing//fuzzing:java_engine=@rules_fuzzing_oss_fuzz//:oss_fuzz_java_engine --@rules_fuzzing//fuzzing:cc_engine_instrumentation=oss-fuzz --@rules_fuzzing//fuzzing:cc_engine_sanitizer=none --cxxopt=-stdlib=libc++ --linkopt=-lc++ --verbose_failures --spawn_strategy=standalone --action_env=CC=clang --action_env=CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 1 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 5 targets (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 5 targets (8 packages loaded, 14 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @bazel_tools//tools/python ... (16 packages) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_sh; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc_toolchains; Restarting. Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_jdk; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk11_win_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64":       Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Finding Go SHA-256 sums Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Finding Go SHA-256 sums Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/go/go1.18.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/....18.linux-amd64.tar.gz; 14.3 MiB (10.6%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/....18.linux-amd64.tar.gz; 33.4 MiB (24.7%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/....18.linux-amd64.tar.gz; 53.4 MiB (39.5%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/....18.linux-amd64.tar.gz; 73.6 MiB (54.4%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/...18.linux-amd64.tar.gz; 109.8 MiB (81.2%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://dl.google.com/...18.linux-amd64.tar.gz; 128.6 MiB (95.2%) Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain 4s Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain 5s Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @go_sdk; Downloading and extracting Go toolchain 6s Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (34 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @go_sdk// Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (35 packages loaded, 30 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 5 targets (38 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (43 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; Restarting. Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @pypi__installer; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...pi__installer; Extracting installer-0.7.0-py3-none-any.whl.zip Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: 5 targets (43 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (43 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; Restarting. Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @pypi__zipp; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://files.pythonhosted.org/...zipp-1.0.0-py2.py3-none-any.whl Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: 5 targets (43 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (43 packages loaded, 611 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (59 packages loaded, 866 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @com_google_absl//absl/container ... (2 packages) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 5 targets (62 packages loaded, 986 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (62 packages loaded, 993 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_absl_py; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (64 packages loaded, 1017 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @fuzzing_py_deps_six; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 5 targets (64 packages loaded, 1017 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @fuzzing_py_deps_six// Step #3 - "compile-libfuzzer-coverage-x86_64":  INFO: Analyzed 5 targets (65 packages loaded, 1078 targets configured). Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found 5 targets... Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 78] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": [74 / 175] 32 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/throw_delegate.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/elf_mem_image.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_fixed.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/spinlock_wait.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/types/bad_variant_access.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/address_is_readable.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/stacktrace.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/demangle.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         ERROR: /root/.cache/bazel/_bazel_root/a93ad4e922dc92c27d422e6beddc7326/external/com_google_absl/absl/strings/BUILD.bazel:115:11: Compiling absl/strings/internal/utf8.cc failed: undeclared inclusion(s) in rule '@com_google_absl//absl/strings:internal': Step #3 - "compile-libfuzzer-coverage-x86_64": this rule is missing dependency declarations for the following files included by 'absl/strings/internal/utf8.cc': Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/atomic_hook.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/base_internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/cycleclock_internal.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/dynamic_annotations.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/log_severity.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/errno_saver.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/spinlock_wait.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-opt-ST-25bcd44a9d1b/bin/external/com_google_absl/absl/base/base.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": [75 / 175] 31 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/throw_delegate.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/elf_mem_image.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/time/internal/cctz/src/time_zone_fixed.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/spinlock_wait.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/types/bad_variant_access.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/address_is_readable.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/stacktrace.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/demangle.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         INFO: Elapsed time: 12.852s, Critical Path: 0.43s Step #3 - "compile-libfuzzer-coverage-x86_64": [106 / 175] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: 106 processes: 106 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": [106 / 175] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": FAILED: Build did NOT complete successfully Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image opencensus-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 opencensus-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1