starting build "8f59b263-3dec-434b-88cf-b39c8664c72a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 16.9kB Step #1: Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: ee06c35af532: Pulling fs layer Step #1: c36614e90b60: Pulling fs layer Step #1: f7916c9a38bf: Pulling fs layer Step #1: 45aba247b141: Pulling fs layer Step #1: 3373c7ec2037: Pulling fs layer Step #1: 75f33f8f2070: Pulling fs layer Step #1: 7ca928a6e048: Pulling fs layer Step #1: d63773318bc1: Pulling fs layer Step #1: d48cd156a215: Pulling fs layer Step #1: f825c78807d7: Pulling fs layer Step #1: 23baad8ed203: Pulling fs layer Step #1: 44ab4bfa873a: Pulling fs layer Step #1: 9627a9a2b1ad: Pulling fs layer Step #1: 58babef70f1b: Pulling fs layer Step #1: 76cfe82852de: Pulling fs layer Step #1: ae84697013da: Pulling fs layer Step #1: b720c9261036: Pulling fs layer Step #1: f7916c9a38bf: Waiting Step #1: 2e43624579d5: Pulling fs layer Step #1: 75f33f8f2070: Waiting Step #1: eb77aa496973: Pulling fs layer Step #1: 45aba247b141: Waiting Step #1: 82414ded40c6: Pulling fs layer Step #1: d63773318bc1: Waiting Step #1: 7ca928a6e048: Waiting Step #1: c58796fec269: Pulling fs layer Step #1: 3373c7ec2037: Waiting Step #1: 413d06e26590: Pulling fs layer Step #1: 7bd5e0879902: Pulling fs layer Step #1: f825c78807d7: Waiting Step #1: d48cd156a215: Waiting Step #1: 1e47901c4623: Pulling fs layer Step #1: 78311f612a03: Pulling fs layer Step #1: 58babef70f1b: Waiting Step #1: ae84697013da: Waiting Step #1: 9627a9a2b1ad: Waiting Step #1: 09b5d9ecfd69: Pulling fs layer Step #1: b720c9261036: Waiting Step #1: 23baad8ed203: Waiting Step #1: 76cfe82852de: Waiting Step #1: 79b30ddeffc0: Pulling fs layer Step #1: 44ab4bfa873a: Waiting Step #1: c58796fec269: Waiting Step #1: 3271cdcf1f7c: Pulling fs layer Step #1: 82414ded40c6: Waiting Step #1: 66a39d43e4df: Pulling fs layer Step #1: 78311f612a03: Waiting Step #1: eb77aa496973: Waiting Step #1: 413d06e26590: Waiting Step #1: 7bd5e0879902: Waiting Step #1: 09b5d9ecfd69: Waiting Step #1: 1e47901c4623: Waiting Step #1: c36614e90b60: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 45aba247b141: Verifying Checksum Step #1: 45aba247b141: Download complete Step #1: f7916c9a38bf: Verifying Checksum Step #1: f7916c9a38bf: Download complete Step #1: 3373c7ec2037: Verifying Checksum Step #1: 3373c7ec2037: Download complete Step #1: 7ca928a6e048: Verifying Checksum Step #1: 7ca928a6e048: Download complete Step #1: d63773318bc1: Download complete Step #1: ee06c35af532: Verifying Checksum Step #1: ee06c35af532: Download complete Step #1: f825c78807d7: Verifying Checksum Step #1: f825c78807d7: Download complete Step #1: 23baad8ed203: Verifying Checksum Step #1: 23baad8ed203: Download complete Step #1: b549f31133a9: Pull complete Step #1: 44ab4bfa873a: Verifying Checksum Step #1: 44ab4bfa873a: Download complete Step #1: 9627a9a2b1ad: Verifying Checksum Step #1: 9627a9a2b1ad: Download complete Step #1: 58babef70f1b: Download complete Step #1: 76cfe82852de: Download complete Step #1: ae84697013da: Download complete Step #1: b720c9261036: Download complete Step #1: 2e43624579d5: Verifying Checksum Step #1: 2e43624579d5: Download complete Step #1: eb77aa496973: Verifying Checksum Step #1: eb77aa496973: Download complete Step #1: 82414ded40c6: Verifying Checksum Step #1: 82414ded40c6: Download complete Step #1: c58796fec269: Verifying Checksum Step #1: c58796fec269: Download complete Step #1: d48cd156a215: Verifying Checksum Step #1: d48cd156a215: Download complete Step #1: 413d06e26590: Verifying Checksum Step #1: 413d06e26590: Download complete Step #1: 7bd5e0879902: Verifying Checksum Step #1: 7bd5e0879902: Download complete Step #1: 78311f612a03: Verifying Checksum Step #1: 78311f612a03: Download complete Step #1: 1e47901c4623: Verifying Checksum Step #1: 1e47901c4623: Download complete Step #1: 79b30ddeffc0: Download complete Step #1: 3271cdcf1f7c: Verifying Checksum Step #1: 3271cdcf1f7c: Download complete Step #1: 09b5d9ecfd69: Verifying Checksum Step #1: 09b5d9ecfd69: Download complete Step #1: 66a39d43e4df: Verifying Checksum Step #1: 66a39d43e4df: Download complete Step #1: 75f33f8f2070: Verifying Checksum Step #1: 75f33f8f2070: Download complete Step #1: ee06c35af532: Pull complete Step #1: c36614e90b60: Pull complete Step #1: f7916c9a38bf: Pull complete Step #1: 45aba247b141: Pull complete Step #1: 3373c7ec2037: Pull complete Step #1: 75f33f8f2070: Pull complete Step #1: 7ca928a6e048: Pull complete Step #1: d63773318bc1: Pull complete Step #1: d48cd156a215: Pull complete Step #1: f825c78807d7: Pull complete Step #1: 23baad8ed203: Pull complete Step #1: 44ab4bfa873a: Pull complete Step #1: 9627a9a2b1ad: Pull complete Step #1: 58babef70f1b: Pull complete Step #1: 76cfe82852de: Pull complete Step #1: ae84697013da: Pull complete Step #1: b720c9261036: Pull complete Step #1: 2e43624579d5: Pull complete Step #1: eb77aa496973: Pull complete Step #1: 82414ded40c6: Pull complete Step #1: c58796fec269: Pull complete Step #1: 413d06e26590: Pull complete Step #1: 7bd5e0879902: Pull complete Step #1: 1e47901c4623: Pull complete Step #1: 78311f612a03: Pull complete Step #1: 09b5d9ecfd69: Pull complete Step #1: 79b30ddeffc0: Pull complete Step #1: 3271cdcf1f7c: Pull complete Step #1: 66a39d43e4df: Pull complete Step #1: Digest: sha256:d138a2357c04b5f9224cb9fddbd0d7c93493af3ff70861cece769de5878993e5 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> ac9fe2ae38ad Step #1: Step 2/8 : RUN apt-get update && apt-get --no-install-recommends install -y build-essential make curl wget rsync Step #1: ---> Running in ac21aa1f2fdf Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (110 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: build-essential is already the newest version (12.8ubuntu1.1). Step #1: curl is already the newest version (7.68.0-1ubuntu2.20). Step #1: rsync is already the newest version (3.1.3-8ubuntu0.7). Step #1: wget is already the newest version (1.20.3-1ubuntu2). Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container ac21aa1f2fdf Step #1: ---> 829c8ddd8727 Step #1: Step 3/8 : RUN echo "deb [arch=amd64] http://storage.googleapis.com/bazel-apt stable jdk1.8" | tee /etc/apt/sources.list.d/bazel.list Step #1: ---> Running in 16fd587616bc Step #1: deb [arch=amd64] http://storage.googleapis.com/bazel-apt stable jdk1.8 Step #1: Removing intermediate container 16fd587616bc Step #1: ---> 092d375ed1e1 Step #1: Step 4/8 : RUN curl https://bazel.build/bazel-release.pub.gpg | apt-key add - Step #1: ---> Running in f5de3926e871 Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1: Dload Upload Total Spent Left Speed Step #1: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0Warning: apt-key output should not be parsed (stdout is not a terminal) Step #1:  100 4714 100 4714 0 0 23452 0 --:--:-- --:--:-- --:--:-- 23452 Step #1: OK Step #1: Removing intermediate container f5de3926e871 Step #1: ---> 004249e70976 Step #1: Step 5/8 : RUN apt-get update && apt-get install -y bazel Step #1: ---> Running in c0015e7a3a23 Step #1: Get:1 http://storage.googleapis.com/bazel-apt stable InRelease [2262 B] Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Get:3 http://storage.googleapis.com/bazel-apt stable/jdk1.8 amd64 Packages [11.2 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Hit:5 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #1: Hit:6 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 13.5 kB in 1s (20.4 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: zlib1g-dev Step #1: Suggested packages: Step #1: google-jdk | java8-sdk-headless | java8-jdk | java8-sdk Step #1: | oracle-java8-installer bash-completion Step #1: The following NEW packages will be installed: Step #1: bazel zlib1g-dev Step #1: 0 upgraded, 2 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 51.1 MB of archives. Step #1: After this operation, 607 kB of additional disk space will be used. Step #1: Get:1 http://storage.googleapis.com/bazel-apt stable/jdk1.8 amd64 bazel amd64 6.4.0 [51.0 MB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 51.1 MB in 1s (77.7 MB/s) Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17382 files and directories currently installed.) Step #1: Preparing to unpack .../zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Selecting previously unselected package bazel. Step #1: Preparing to unpack .../archives/bazel_6.4.0_amd64.deb ... Step #1: Unpacking bazel (6.4.0) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up bazel (6.4.0) ... Step #1: Removing intermediate container c0015e7a3a23 Step #1: ---> 7dbcee801b51 Step #1: Step 6/8 : RUN curl -Lo /usr/bin/bazel https://github.com/bazelbuild/bazelisk/releases/download/v1.1.0/bazelisk-linux-amd64 && chmod +x /usr/bin/bazel Step #1: ---> Running in 8ad7b3dda591 Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1:  Dload Upload Total Spent  Left Speed Step #1: 0  0 0  0 0 0  0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #1:  100 6036k 100 6036k 0 0 16.0M 0 --:--:-- --:--:-- --:--:-- 16.0M Step #1: Removing intermediate container 8ad7b3dda591 Step #1: ---> f8180bd71655 Step #1: Step 7/8 : RUN git clone --depth 1 https://github.com/abseil/abseil-cpp.git Step #1: ---> Running in 046a0079b9b3 Step #1: Cloning into 'abseil-cpp'... Step #1: Removing intermediate container 046a0079b9b3 Step #1: ---> 0ebab84099d6 Step #1: Step 8/8 : COPY BUILD WORKSPACE build.sh string_escape_fuzzer.cc string_utilities_fuzzer.cc $SRC/ Step #1: ---> 428a0737389e Step #1: Successfully built 428a0737389e Step #1: Successfully tagged gcr.io/oss-fuzz/abseil-cpp:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/abseil-cpp Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file4IPh5L Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/abseil-cpp/.git Step #2 - "srcmap": + GIT_DIR=/src/abseil-cpp Step #2 - "srcmap": + cd /src/abseil-cpp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/abseil/abseil-cpp.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f393335cb7410fc3a88f41dc5dd878c020213e0b Step #2 - "srcmap": + jq_inplace /tmp/file4IPh5L '."/src/abseil-cpp" = { type: "git", url: "https://github.com/abseil/abseil-cpp.git", rev: "f393335cb7410fc3a88f41dc5dd878c020213e0b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file0JZmYc Step #2 - "srcmap": + cat /tmp/file4IPh5L Step #2 - "srcmap": + jq '."/src/abseil-cpp" = { type: "git", url: "https://github.com/abseil/abseil-cpp.git", rev: "f393335cb7410fc3a88f41dc5dd878c020213e0b" }' Step #2 - "srcmap": + mv /tmp/file0JZmYc /tmp/file4IPh5L Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file4IPh5L Step #2 - "srcmap": + rm /tmp/file4IPh5L Step #2 - "srcmap": { Step #2 - "srcmap": "/src/abseil-cpp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/abseil/abseil-cpp.git", Step #2 - "srcmap": "rev": "f393335cb7410fc3a88f41dc5dd878c020213e0b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": ++ for f in ${CXXFLAGS} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo --cxxopt=-std=c++14 --linkopt=-std=c++14 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ '[' coverage = undefined ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + readonly 'EXTRA_BAZEL_FLAGS=--conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-std=c++14 --linkopt=-std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + EXTRA_BAZEL_FLAGS='--conlyopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-O1 --linkopt=-O1 Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-gline-tables-only --linkopt=-gline-tables-only Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-pthread --linkopt=-pthread Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wl,-lm --linkopt=-Wl,-lm Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --cxxopt=-std=c++14 --linkopt=-std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGETS=("string_escape_fuzzer" "string_utilities_fuzzer") Step #3 - "compile-libfuzzer-coverage-x86_64": + declare FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel build --verbose_failures --dynamic_mode=off --spawn_strategy=standalone --genrule_strategy=standalone --strip=never --linkopt=-pthread --copt=-fsanitize=fuzzer --linkopt=-fsanitize=fuzzer --linkopt=-lc++ --conlyopt=-O1 --linkopt=-O1 --conlyopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer --conlyopt=-gline-tables-only --linkopt=-gline-tables-only --conlyopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --conlyopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate --conlyopt=-fcoverage-mapping --linkopt=-fcoverage-mapping --conlyopt=-pthread --linkopt=-pthread --conlyopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed --conlyopt=-Wl,-ldl --linkopt=-Wl,-ldl --conlyopt=-Wl,-lm --linkopt=-Wl,-lm --conlyopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument --cxxopt=-O1 --linkopt=-O1 --cxxopt=-fno-omit-frame-pointer --linkopt=-fno-omit-frame-pointer --cxxopt=-gline-tables-only --linkopt=-gline-tables-only --cxxopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --linkopt=-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION --cxxopt=-fprofile-instr-generate --linkopt=-fprofile-instr-generate --cxxopt=-fcoverage-mapping --linkopt=-fcoverage-mapping --cxxopt=-pthread --linkopt=-pthread --cxxopt=-Wl,--no-as-needed --linkopt=-Wl,--no-as-needed --cxxopt=-Wl,-ldl --linkopt=-Wl,-ldl --cxxopt=-Wl,-lm --linkopt=-Wl,-lm --cxxopt=-Wno-unused-command-line-argument --linkopt=-Wno-unused-command-line-argument --cxxopt=-stdlib=libc++ --linkopt=-stdlib=libc++ --cxxopt=-std=c++14 --linkopt=-std=c++14 string_escape_fuzzer string_utilities_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": 2023/11/20 06:34:01 Downloading https://releases.bazel.build/6.4.0/release/bazel-6.4.0-linux-x86_64... Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting Bazel installation... Step #3 - "compile-libfuzzer-coverage-x86_64": Starting local Bazel server and connecting to it... Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @bazel_tools; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 2 targets (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: 2 targets (5 packages loaded, 6 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @bazel_tools//tools/jdk ... (2 packages) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...itory @remotejdk11_linux_s390x_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_jdk; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_sh; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk11_macos_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...ory @remotejdk17_linux_aarch64_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...ory @remotejdk11_linux_ppc64le_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @remotejdk18_linux_toolchain_config_repo; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...macos_aarch64_toolchain_config_repo; starting ... (23 fetches) Step #3 - "compile-libfuzzer-coverage-x86_64":          Analyzing: 2 targets (32 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @com_google_absl//absl/strings Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @local_config_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @rules_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 2 targets (33 packages loaded, 123 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @local_config_cc// Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @rules_cc; starting Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: 2 targets (38 packages loaded, 160 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @com_google_absl//absl/base ... (7 packages) Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: 2 targets (53 packages loaded, 481 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Analyzed 2 targets (53 packages loaded, 517 targets configured). Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found 2 targets... Step #3 - "compile-libfuzzer-coverage-x86_64":  checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 139] 6 actions, 0 running Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/types:bad_optional_access; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/strings:string_view; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Writing script external/com_google_absl/absl/base/endian.cppmap; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/base:raw_logging_internal; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/base:malloc_internal; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/crc:crc_cord_state; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/types:optional; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": @com_google_absl//absl/functional:function_ref; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         [69 / 165] 32 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/base/internal/spinlock_wait.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling string_escape_fuzzer.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/crc/internal/cpu_detect.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/demangle.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/substitute.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/charconv.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/str_split.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/internal/charconv_parse.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         ERROR: /root/.cache/bazel/_bazel_root/f8087e59fd95af1ae29e8fcb7ff1a3dc/external/com_google_absl/absl/base/BUILD.bazel:110:11: Compiling absl/base/internal/spinlock_wait.cc failed: undeclared inclusion(s) in rule '@com_google_absl//absl/base:spinlock_wait': Step #3 - "compile-libfuzzer-coverage-x86_64": this rule is missing dependency declarations for the following files included by 'absl/base/internal/spinlock_wait.cc': Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/base/config.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": 'bazel-out/k8-fastbuild/bin/external/com_google_absl/absl/meta/type_traits.cppmap' Step #3 - "compile-libfuzzer-coverage-x86_64": [70 / 165] 31 actions running Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling string_escape_fuzzer.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/crc/internal/cpu_detect.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/debugging/internal/demangle.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/substitute.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/charconv.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/str_split.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/internal/charconv_parse.cc; 0s local Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling absl/strings/internal/escaping.cc; 0s local ... Step #3 - "compile-libfuzzer-coverage-x86_64":         INFO: Elapsed time: 9.427s, Critical Path: 0.85s Step #3 - "compile-libfuzzer-coverage-x86_64": [101 / 165] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: 101 processes: 101 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": [101 / 165] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": FAILED: Build did NOT complete successfully Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image abseil-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 abseil-cpp Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1