starting build "9928c74a-6bab-464d-8079-9e5ee1b3b228" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 10.24kB Step #1: Step 1/10 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 160496dfdc1e: Pulling fs layer Step #1: e2c1e6ffb55e: Pulling fs layer Step #1: 790f0b60d601: Pulling fs layer Step #1: ba5377523637: Pulling fs layer Step #1: fcf19af99e9b: Pulling fs layer Step #1: c120616e8611: Pulling fs layer Step #1: 648979ff9271: Pulling fs layer Step #1: 38b58f40b986: Pulling fs layer Step #1: 6fec27639895: Pulling fs layer Step #1: 6311c17bee61: Pulling fs layer Step #1: 63cd1cde0eec: Pulling fs layer Step #1: 1ef02760f71f: Pulling fs layer Step #1: fda5a71c8862: Pulling fs layer Step #1: 7ad2f7c615a2: Pulling fs layer Step #1: 0b07407e6342: Pulling fs layer Step #1: fbed995eca46: Pulling fs layer Step #1: 4381c7f8884c: Pulling fs layer Step #1: bd3393df7542: Pulling fs layer Step #1: f8afaf16f210: Pulling fs layer Step #1: 086216b75b6f: Pulling fs layer Step #1: ebb3d4059a93: Pulling fs layer Step #1: 1cb7b39b268b: Pulling fs layer Step #1: fd1f752e3c9f: Pulling fs layer Step #1: 84db406b755d: Pulling fs layer Step #1: 3968f7202bef: Pulling fs layer Step #1: 37c0a55501a4: Pulling fs layer Step #1: fddacf1580ff: Pulling fs layer Step #1: 3c790d5687e6: Pulling fs layer Step #1: ba5377523637: Waiting Step #1: 0fcda4deea49: Pulling fs layer Step #1: cfc1aaab3799: Pulling fs layer Step #1: 5764b068ae0e: Pulling fs layer Step #1: 1ef02760f71f: Waiting Step #1: fcf19af99e9b: Waiting Step #1: c120616e8611: Waiting Step #1: fda5a71c8862: Waiting Step #1: 648979ff9271: Waiting Step #1: 7ad2f7c615a2: Waiting Step #1: bd3393df7542: Waiting Step #1: 790f0b60d601: Waiting Step #1: 086216b75b6f: Waiting Step #1: 38b58f40b986: Waiting Step #1: 6fec27639895: Waiting Step #1: 63cd1cde0eec: Waiting Step #1: fbed995eca46: Waiting Step #1: 6311c17bee61: Waiting Step #1: fd1f752e3c9f: Waiting Step #1: 3968f7202bef: Waiting Step #1: 4381c7f8884c: Waiting Step #1: ebb3d4059a93: Waiting Step #1: 5764b068ae0e: Waiting Step #1: 84db406b755d: Waiting Step #1: cfc1aaab3799: Waiting Step #1: f8afaf16f210: Waiting Step #1: e2c1e6ffb55e: Verifying Checksum Step #1: e2c1e6ffb55e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ba5377523637: Verifying Checksum Step #1: ba5377523637: Download complete Step #1: 790f0b60d601: Verifying Checksum Step #1: 790f0b60d601: Download complete Step #1: fcf19af99e9b: Verifying Checksum Step #1: fcf19af99e9b: Download complete Step #1: 648979ff9271: Verifying Checksum Step #1: 648979ff9271: Download complete Step #1: 38b58f40b986: Verifying Checksum Step #1: 38b58f40b986: Download complete Step #1: 160496dfdc1e: Verifying Checksum Step #1: 160496dfdc1e: Download complete Step #1: b549f31133a9: Pull complete Step #1: 6311c17bee61: Verifying Checksum Step #1: 6311c17bee61: Download complete Step #1: 63cd1cde0eec: Verifying Checksum Step #1: 63cd1cde0eec: Download complete Step #1: 1ef02760f71f: Verifying Checksum Step #1: 1ef02760f71f: Download complete Step #1: fda5a71c8862: Verifying Checksum Step #1: fda5a71c8862: Download complete Step #1: 7ad2f7c615a2: Verifying Checksum Step #1: 7ad2f7c615a2: Download complete Step #1: 0b07407e6342: Verifying Checksum Step #1: 0b07407e6342: Download complete Step #1: fbed995eca46: Verifying Checksum Step #1: fbed995eca46: Download complete Step #1: 4381c7f8884c: Verifying Checksum Step #1: 4381c7f8884c: Download complete Step #1: bd3393df7542: Verifying Checksum Step #1: bd3393df7542: Download complete Step #1: 6fec27639895: Verifying Checksum Step #1: 6fec27639895: Download complete Step #1: f8afaf16f210: Verifying Checksum Step #1: f8afaf16f210: Download complete Step #1: 086216b75b6f: Verifying Checksum Step #1: 086216b75b6f: Download complete Step #1: ebb3d4059a93: Verifying Checksum Step #1: ebb3d4059a93: Download complete Step #1: 1cb7b39b268b: Download complete Step #1: fd1f752e3c9f: Verifying Checksum Step #1: fd1f752e3c9f: Download complete Step #1: c120616e8611: Verifying Checksum Step #1: c120616e8611: Download complete Step #1: 84db406b755d: Verifying Checksum Step #1: 84db406b755d: Download complete Step #1: 3968f7202bef: Verifying Checksum Step #1: 3968f7202bef: Download complete Step #1: 37c0a55501a4: Verifying Checksum Step #1: 37c0a55501a4: Download complete Step #1: fddacf1580ff: Verifying Checksum Step #1: fddacf1580ff: Download complete Step #1: cfc1aaab3799: Download complete Step #1: 3c790d5687e6: Verifying Checksum Step #1: 3c790d5687e6: Download complete Step #1: 0fcda4deea49: Verifying Checksum Step #1: 0fcda4deea49: Download complete Step #1: 5764b068ae0e: Verifying Checksum Step #1: 5764b068ae0e: Download complete Step #1: 160496dfdc1e: Pull complete Step #1: e2c1e6ffb55e: Pull complete Step #1: 790f0b60d601: Pull complete Step #1: ba5377523637: Pull complete Step #1: fcf19af99e9b: Pull complete Step #1: c120616e8611: Pull complete Step #1: 648979ff9271: Pull complete Step #1: 38b58f40b986: Pull complete Step #1: 6fec27639895: Pull complete Step #1: 6311c17bee61: Pull complete Step #1: 63cd1cde0eec: Pull complete Step #1: 1ef02760f71f: Pull complete Step #1: fda5a71c8862: Pull complete Step #1: 7ad2f7c615a2: Pull complete Step #1: 0b07407e6342: Pull complete Step #1: fbed995eca46: Pull complete Step #1: 4381c7f8884c: Pull complete Step #1: bd3393df7542: Pull complete Step #1: f8afaf16f210: Pull complete Step #1: 086216b75b6f: Pull complete Step #1: ebb3d4059a93: Pull complete Step #1: 1cb7b39b268b: Pull complete Step #1: fd1f752e3c9f: Pull complete Step #1: 84db406b755d: Pull complete Step #1: 3968f7202bef: Pull complete Step #1: 37c0a55501a4: Pull complete Step #1: fddacf1580ff: Pull complete Step #1: 3c790d5687e6: Pull complete Step #1: 0fcda4deea49: Pull complete Step #1: cfc1aaab3799: Pull complete Step #1: 5764b068ae0e: Pull complete Step #1: Digest: sha256:b40f1a2ba14708e0ba1594dfbb4e460eb329c098f352ebac59ea72a2c9f7bbc8 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 595c6f14e029 Step #1: Step 2/10 : RUN apt-get update && apt-get install --yes cmake ninja-build Step #1: ---> Running in 30adc5b8f1de Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (123 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: Suggested packages: Step #1: cmake-doc lrzip python3 Step #1: The following NEW packages will be installed: Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: ninja-build Step #1: 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 15.1 MB of archives. Step #1: After this operation, 65.3 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.3 [327 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 15.1 MB in 2s (9184 kB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.3_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.3) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package ninja-build. Step #1: Preparing to unpack .../8-ninja-build_1.10.0-1build1_amd64.deb ... Step #1: Unpacking ninja-build (1.10.0-1build1) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up ninja-build (1.10.0-1build1) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.3) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 30adc5b8f1de Step #1: ---> 335ee3b4a79e Step #1: Step 3/10 : RUN curl -L http://ftp.gnu.org/pub/gnu/gperf/gperf-3.1.tar.gz -O Step #1: ---> Running in 65287b896ad0 Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1: Dload Upload Total Spent Left Speed Step #1: 0 0 0 0 0  0  0 0 --:--:-- --:--:-- --:--:-- 0 100 1187k 100 1187k 0 0 3116k 0 --:--:-- --:--:-- --:--:-- 3116k Step #1: Removing intermediate container 65287b896ad0 Step #1: ---> 29a551a6e3b0 Step #1: Step 4/10 : RUN git clone --depth 1 --branch=dev git://code.qt.io/qt/qtbase.git Step #1: ---> Running in 47fe8a1ef51a Step #1: Cloning into 'qtbase'... Step #1: Updating files: 39% (8769/22296) Updating files: 40% (8919/22296) Updating files: 41% (9142/22296) Updating files: 42% (9365/22296) Updating files: 43% (9588/22296) Updating files: 44% (9811/22296) Updating files: 45% (10034/22296) Updating files: 46% (10257/22296) Updating files: 47% (10480/22296) Updating files: 48% (10703/22296) Updating files: 49% (10926/22296) Updating files: 50% (11148/22296) Updating files: 51% (11371/22296) Updating files: 52% (11594/22296) Updating files: 53% (11817/22296) Updating files: 54% (12040/22296) Updating files: 55% (12263/22296) Updating files: 56% (12486/22296) Updating files: 57% (12709/22296) Updating files: 58% (12932/22296) Updating files: 59% (13155/22296) Updating files: 60% (13378/22296) Updating files: 61% (13601/22296) Updating files: 62% (13824/22296) Updating files: 63% (14047/22296) Updating files: 64% (14270/22296) Updating files: 65% (14493/22296) Updating files: 66% (14716/22296) Updating files: 67% (14939/22296) Updating files: 68% (15162/22296) Updating files: 69% (15385/22296) Updating files: 70% (15608/22296) Updating files: 71% (15831/22296) Updating files: 72% (16054/22296) Updating files: 73% (16277/22296) Updating files: 74% (16500/22296) Updating files: 75% (16722/22296) Updating files: 76% (16945/22296) Updating files: 77% (17168/22296) Updating files: 78% (17391/22296) Updating files: 79% (17614/22296) Updating files: 80% (17837/22296) Updating files: 81% (18060/22296) Updating files: 82% (18283/22296) Updating files: 83% (18506/22296) Updating files: 84% (18729/22296) Updating files: 85% (18952/22296) Updating files: 86% (19175/22296) Updating files: 87% (19398/22296) Updating files: 88% (19621/22296) Updating files: 89% (19844/22296) Updating files: 90% (20067/22296) Updating files: 90% (20095/22296) Updating files: 91% (20290/22296) Updating files: 92% (20513/22296) Updating files: 93% (20736/22296) Updating files: 94% (20959/22296) Updating files: 95% (21182/22296) Updating files: 96% (21405/22296) Updating files: 97% (21628/22296) Updating files: 98% (21851/22296) Updating files: 99% (22074/22296) Updating files: 100% (22296/22296) Updating files: 100% (22296/22296), done. Step #1: Removing intermediate container 47fe8a1ef51a Step #1: ---> ff55ac88a125 Step #1: Step 5/10 : RUN git clone --depth 1 -b master https://invent.kde.org/frameworks/extra-cmake-modules.git Step #1: ---> Running in e60c54f2bccb Step #1: Cloning into 'extra-cmake-modules'... Step #1: Removing intermediate container e60c54f2bccb Step #1: ---> 7ab84b3ff112 Step #1: Step 6/10 : RUN git clone --depth 1 -b master https://invent.kde.org/frameworks/kcodecs.git Step #1: ---> Running in d261fb078e41 Step #1: Cloning into 'kcodecs'... Step #1: Removing intermediate container d261fb078e41 Step #1: ---> 1b34b622c59b Step #1: Step 7/10 : RUN git clone --depth 1 https://gitlab.freedesktop.org/uchardet/uchardet.git Step #1: ---> Running in 1904dafd07c2 Step #1: Cloning into 'uchardet'... Step #1: Removing intermediate container 1904dafd07c2 Step #1: ---> b774425fffd7 Step #1: Step 8/10 : COPY build.sh $SRC Step #1: ---> a921463b0b4c Step #1: Step 9/10 : COPY kcodecs_fuzzer.cc $SRC Step #1: ---> 6c6994e3ed11 Step #1: Step 10/10 : WORKDIR kcodecs Step #1: ---> Running in 32623f6acab4 Step #1: Removing intermediate container 32623f6acab4 Step #1: ---> fc82a02dd9c8 Step #1: Successfully built fc82a02dd9c8 Step #1: Successfully tagged gcr.io/oss-fuzz/kcodecs:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/kcodecs Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileY8RFyM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/uchardet/.git Step #2 - "srcmap": + GIT_DIR=/src/uchardet Step #2 - "srcmap": + cd /src/uchardet Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://gitlab.freedesktop.org/uchardet/uchardet.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=edae8e81cfb8092496f94da1a306c4c9f0ce32bb Step #2 - "srcmap": + jq_inplace /tmp/fileY8RFyM '."/src/uchardet" = { type: "git", url: "https://gitlab.freedesktop.org/uchardet/uchardet.git", rev: "edae8e81cfb8092496f94da1a306c4c9f0ce32bb" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file15mxbc Step #2 - "srcmap": + cat /tmp/fileY8RFyM Step #2 - "srcmap": + jq '."/src/uchardet" = { type: "git", url: "https://gitlab.freedesktop.org/uchardet/uchardet.git", rev: "edae8e81cfb8092496f94da1a306c4c9f0ce32bb" }' Step #2 - "srcmap": + mv /tmp/file15mxbc /tmp/fileY8RFyM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/kcodecs/.git Step #2 - "srcmap": + GIT_DIR=/src/kcodecs Step #2 - "srcmap": + cd /src/kcodecs Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://invent.kde.org/frameworks/kcodecs.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1e8fb7bbfb15c86c8f56a858f6c1fef11ba22c66 Step #2 - "srcmap": + jq_inplace /tmp/fileY8RFyM '."/src/kcodecs" = { type: "git", url: "https://invent.kde.org/frameworks/kcodecs.git", rev: "1e8fb7bbfb15c86c8f56a858f6c1fef11ba22c66" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileGhuQDG Step #2 - "srcmap": + cat /tmp/fileY8RFyM Step #2 - "srcmap": + jq '."/src/kcodecs" = { type: "git", url: "https://invent.kde.org/frameworks/kcodecs.git", rev: "1e8fb7bbfb15c86c8f56a858f6c1fef11ba22c66" }' Step #2 - "srcmap": + mv /tmp/fileGhuQDG /tmp/fileY8RFyM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/extra-cmake-modules/.git Step #2 - "srcmap": + GIT_DIR=/src/extra-cmake-modules Step #2 - "srcmap": + cd /src/extra-cmake-modules Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://invent.kde.org/frameworks/extra-cmake-modules.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=5117ebef040d04ccbc21e826214ceac173c6e820 Step #2 - "srcmap": + jq_inplace /tmp/fileY8RFyM '."/src/extra-cmake-modules" = { type: "git", url: "https://invent.kde.org/frameworks/extra-cmake-modules.git", rev: "5117ebef040d04ccbc21e826214ceac173c6e820" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileD60xkg Step #2 - "srcmap": + cat /tmp/fileY8RFyM Step #2 - "srcmap": + jq '."/src/extra-cmake-modules" = { type: "git", url: "https://invent.kde.org/frameworks/extra-cmake-modules.git", rev: "5117ebef040d04ccbc21e826214ceac173c6e820" }' Step #2 - "srcmap": + mv /tmp/fileD60xkg /tmp/fileY8RFyM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/qtbase/.git Step #2 - "srcmap": + GIT_DIR=/src/qtbase Step #2 - "srcmap": + cd /src/qtbase Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=git://code.qt.io/qt/qtbase.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1cf03c974c433b7a5330b56bd9e519287fce6f7f Step #2 - "srcmap": + jq_inplace /tmp/fileY8RFyM '."/src/qtbase" = { type: "git", url: "git://code.qt.io/qt/qtbase.git", rev: "1cf03c974c433b7a5330b56bd9e519287fce6f7f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileZdVUDL Step #2 - "srcmap": + cat /tmp/fileY8RFyM Step #2 - "srcmap": + jq '."/src/qtbase" = { type: "git", url: "git://code.qt.io/qt/qtbase.git", rev: "1cf03c974c433b7a5330b56bd9e519287fce6f7f" }' Step #2 - "srcmap": + mv /tmp/fileZdVUDL /tmp/fileY8RFyM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileY8RFyM Step #2 - "srcmap": + rm /tmp/fileY8RFyM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/uchardet": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://gitlab.freedesktop.org/uchardet/uchardet.git", Step #2 - "srcmap": "rev": "edae8e81cfb8092496f94da1a306c4c9f0ce32bb" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/kcodecs": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://invent.kde.org/frameworks/kcodecs.git", Step #2 - "srcmap": "rev": "1e8fb7bbfb15c86c8f56a858f6c1fef11ba22c66" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/extra-cmake-modules": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://invent.kde.org/frameworks/extra-cmake-modules.git", Step #2 - "srcmap": "rev": "5117ebef040d04ccbc21e826214ceac173c6e820" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/qtbase": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "git://code.qt.io/qt/qtbase.git", Step #2 - "srcmap": "rev": "1cf03c974c433b7a5330b56bd9e519287fce6f7f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + tar xzf gperf-3.1.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -f gperf-3.1.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd gperf-3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument' Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + unset CFLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": + unset CXXFLAGS Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --prefix=/usr 'CXX=clang++ -std=c++14' Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": === configuring in lib (/src/gperf-3.1/lib) Step #3 - "compile-libfuzzer-coverage-x86_64": configure: running /bin/bash ./configure --disable-option-checking '--prefix=/usr' 'CXX=clang++ -std=c++14' --cache-file=/dev/null --srcdir=. Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ -std=c++14 accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -std=c++14 -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": === configuring in src (/src/gperf-3.1/src) Step #3 - "compile-libfuzzer-coverage-x86_64": configure: running /bin/bash ./configure --disable-option-checking '--prefix=/usr' 'CXX=clang++ -std=c++14' --cache-file=/dev/null --srcdir=. Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ -std=c++14 accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -std=c++14 -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stack-allocated variable-size arrays... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for rand in -lm... yes Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": === configuring in tests (/src/gperf-3.1/tests) Step #3 - "compile-libfuzzer-coverage-x86_64": configure: running /bin/bash ./configure --disable-option-checking '--prefix=/usr' 'CXX=clang++ -std=c++14' --cache-file=/dev/null --srcdir=. Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C++ compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang++ -std=c++14 accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C++ preprocessor... clang++ -std=c++14 -E Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": === configuring in doc (/src/gperf-3.1/doc) Step #3 - "compile-libfuzzer-coverage-x86_64": configure: running /bin/bash ./configure --disable-option-checking '--prefix=/usr' 'CXX=clang++ -std=c++14' --cache-file=/dev/null --srcdir=. Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 install Step #3 - "compile-libfuzzer-coverage-x86_64": cd lib; make install Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/gperf-3.1/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": clang -g -O2 -I. -c ./getopt.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -g -O2 -I. -c ./getopt1.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -c ./getline.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -c ./hash.cc Step #3 - "compile-libfuzzer-coverage-x86_64": ./getline.cc:58:7: warning: 'register' storage class specifier is deprecated and incompatible with C++17 [-Wdeprecated-register] Step #3 - "compile-libfuzzer-coverage-x86_64": 58 | register int c = getc (stream); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": rm -f libgp.a Step #3 - "compile-libfuzzer-coverage-x86_64": ar rc libgp.a getopt.o getopt1.o getline.o hash.o Step #3 - "compile-libfuzzer-coverage-x86_64": ranlib libgp.a Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/gperf-3.1/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": cd src; make install Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/gperf-3.1/src' Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./version.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./positions.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./options.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./keyword.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./keyword-list.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./input.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./bool-array.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./hash-table.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./search.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./output.cc Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -I. -I./../lib -c ./main.cc Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:249:39: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 249 | DYNAMIC_ARRAY (combined_name, char, strlen (prefix) + strlen (name) + 1); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:46:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 46 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:249:47: note: read of non-constexpr variable 'prefix' is not allowed in a constant expression Step #3 - "compile-libfuzzer-coverage-x86_64": 249 | DYNAMIC_ARRAY (combined_name, char, strlen (prefix) + strlen (name) + 1); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:248:15: note: declared here Step #3 - "compile-libfuzzer-coverage-x86_64": 248 | const char *prefix = option.get_constants_prefix (); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:325:45: warning: operator '?:' has lower precedence than '|'; '|' will be evaluated first [-Wbitwise-conditional-parentheses] Step #3 - "compile-libfuzzer-coverage-x86_64": 325 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:325:45: note: place parentheses around the '|' expression to silence this warning Step #3 - "compile-libfuzzer-coverage-x86_64": 325 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:325:45: note: place parentheses around the '?:' expression to evaluate it first Step #3 - "compile-libfuzzer-coverage-x86_64": 325 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( Step #3 - "compile-libfuzzer-coverage-x86_64":  326 | "(%sconst char *s1, %sconst char *s2)\n" : Step #3 - "compile-libfuzzer-coverage-x86_64": 327 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:327:11: warning: format string is empty [-Wformat-zero-length] Step #3 - "compile-libfuzzer-coverage-x86_64": 327 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:378:45: warning: operator '?:' has lower precedence than '|'; '|' will be evaluated first [-Wbitwise-conditional-parentheses] Step #3 - "compile-libfuzzer-coverage-x86_64": 378 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:378:45: note: place parentheses around the '|' expression to silence this warning Step #3 - "compile-libfuzzer-coverage-x86_64": 378 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:378:45: note: place parentheses around the '?:' expression to evaluate it first Step #3 - "compile-libfuzzer-coverage-x86_64": 378 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( Step #3 - "compile-libfuzzer-coverage-x86_64":  379 | "(%sconst char *s1, %sconst char *s2, %ssize_t n)\n" : Step #3 - "compile-libfuzzer-coverage-x86_64": 380 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:380:11: warning: format string is empty [-Wformat-zero-length] Step #3 - "compile-libfuzzer-coverage-x86_64": 380 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:439:45: warning: operator '?:' has lower precedence than '|'; '|' will be evaluated first [-Wbitwise-conditional-parentheses] Step #3 - "compile-libfuzzer-coverage-x86_64": 439 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:439:45: note: place parentheses around the '|' expression to silence this warning Step #3 - "compile-libfuzzer-coverage-x86_64": 439 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:439:45: note: place parentheses around the '?:' expression to evaluate it first Step #3 - "compile-libfuzzer-coverage-x86_64": 439 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( Step #3 - "compile-libfuzzer-coverage-x86_64":  440 | "(%sconst char *s1, %sconst char *s2, %ssize_t n)\n" : Step #3 - "compile-libfuzzer-coverage-x86_64": 441 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:441:11: warning: format string is empty [-Wformat-zero-length] Step #3 - "compile-libfuzzer-coverage-x86_64": 441 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:840:45: warning: operator '?:' has lower precedence than '|'; '|' will be evaluated first [-Wbitwise-conditional-parentheses] Step #3 - "compile-libfuzzer-coverage-x86_64": 840 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:840:45: note: place parentheses around the '|' expression to silence this warning Step #3 - "compile-libfuzzer-coverage-x86_64": 840 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:840:45: note: place parentheses around the '?:' expression to evaluate it first Step #3 - "compile-libfuzzer-coverage-x86_64": 840 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( Step #3 - "compile-libfuzzer-coverage-x86_64":  841 | "(%sconst char *str, %ssize_t len)\n" : Step #3 - "compile-libfuzzer-coverage-x86_64": 842 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:842:11: warning: format string is empty [-Wformat-zero-length] Step #3 - "compile-libfuzzer-coverage-x86_64": 842 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:1996:45: warning: operator '?:' has lower precedence than '|'; '|' will be evaluated first [-Wbitwise-conditional-parentheses] Step #3 - "compile-libfuzzer-coverage-x86_64": 1996 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:1996:45: note: place parentheses around the '|' expression to silence this warning Step #3 - "compile-libfuzzer-coverage-x86_64": 1996 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:1996:45: note: place parentheses around the '?:' expression to evaluate it first Step #3 - "compile-libfuzzer-coverage-x86_64": 1996 | option[ANSIC] | option[CPLUSPLUS] ? Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ( Step #3 - "compile-libfuzzer-coverage-x86_64":  1997 | "(%sconst char *str, %ssize_t len)\n" : Step #3 - "compile-libfuzzer-coverage-x86_64": 1998 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  Step #3 - "compile-libfuzzer-coverage-x86_64":  |  ) Step #3 - "compile-libfuzzer-coverage-x86_64": ./output.cc:1998:11: warning: format string is empty [-Wformat-zero-length] Step #3 - "compile-libfuzzer-coverage-x86_64": 1998 | "", Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:651:45: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 651 | DYNAMIC_ARRAY (indices, unsigned int, nindices); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:50:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 50 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:651:45: note: read of non-const variable 'nindices' is not allowed in a constant expression Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:637:20: note: declared here Step #3 - "compile-libfuzzer-coverage-x86_64": 637 | unsigned int nindices; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:670:42: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 670 | DYNAMIC_ARRAY (best, unsigned int, _max_key_len); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:50:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 50 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:670:42: note: implicit use of 'this' pointer is only allowed within the evaluation of a call to a 'constexpr' member function Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:671:43: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 671 | DYNAMIC_ARRAY (tryal, unsigned int, _max_key_len); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:50:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 50 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:671:43: note: implicit use of 'this' pointer is only allowed within the evaluation of a call to a 'constexpr' member function Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1068:53: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 1068 | DYNAMIC_ARRAY (split_cardinalities, unsigned int, m + 1); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:50:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 50 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1068:53: note: read of non-const variable 'm' is not allowed in a constant expression Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1067:16: note: declared here Step #3 - "compile-libfuzzer-coverage-x86_64": 1067 | unsigned int m = _max_selchars_length; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1297:42: warning: variable length arrays in C++ are a Clang extension [-Wvla-cxx-extension] Step #3 - "compile-libfuzzer-coverage-x86_64": 1297 | DYNAMIC_ARRAY (iter, unsigned int, k); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:50:53: note: expanded from macro 'DYNAMIC_ARRAY' Step #3 - "compile-libfuzzer-coverage-x86_64": 50 | #define DYNAMIC_ARRAY(var,eltype,size) eltype var[size] Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1297:42: note: read of non-const variable 'k' is not allowed in a constant expression Step #3 - "compile-libfuzzer-coverage-x86_64": ./search.cc:1287:20: note: declared here Step #3 - "compile-libfuzzer-coverage-x86_64": 1287 | unsigned int k = step->_changing_count; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 11 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 5 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": clang++ -std=c++14 -g -O2 -o gperf version.o positions.o options.o keyword.o keyword-list.o input.o bool-array.o hash-table.o search.o output.o main.o ../lib/libgp.a -lm Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/sh ./../build-aux/mkinstalldirs /usr/bin Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c gperf /usr/bin/gperf Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/gperf-3.1/src' Step #3 - "compile-libfuzzer-coverage-x86_64": cd tests; make install Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/gperf-3.1/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Nothing to be done for 'install'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/gperf-3.1/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": cd doc; make install Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/gperf-3.1/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/sh ./../build-aux/mkinstalldirs /usr/share/info Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./gperf.info /usr/share/info/gperf.info Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/sh ./../build-aux/mkinstalldirs /usr/share/man/man1 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./gperf.1 /usr/share/man/man1/gperf.1 Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/sh ./../build-aux/mkinstalldirs /usr/share/doc/ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ./gperf.html /usr/share/doc//gperf.html Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/gperf-3.1/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument' Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + cd extra-cmake-modules Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake . Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Sphinx (missing: Sphinx_BUILD_EXECUTABLE) (Required is at least version "1.2") Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at docs/CMakeLists.txt:21 (find_package): Step #3 - "compile-libfuzzer-coverage-x86_64": By not providing "FindQt6.cmake" in CMAKE_MODULE_PATH this project has Step #3 - "compile-libfuzzer-coverage-x86_64": asked CMake to find a package configuration file provided by "Qt6", but Step #3 - "compile-libfuzzer-coverage-x86_64": CMake did not find one. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find a package configuration file provided by "Qt6" with any of Step #3 - "compile-libfuzzer-coverage-x86_64": the following names: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Qt6Config.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": qt6-config.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Add the installation prefix of "Qt6" to CMAKE_PREFIX_PATH or set "Qt6_DIR" Step #3 - "compile-libfuzzer-coverage-x86_64": to a directory containing one of the above files. If "Qt6" provides a Step #3 - "compile-libfuzzer-coverage-x86_64": separate development package or SDK, be sure it has been installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Qt5 (missing: Qt5_DIR) Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Error at modules/ECMQueryQt.cmake:82 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": No Qt5 qmake executable found. Can't check QT_INSTALL_PREFIX as required Step #3 - "compile-libfuzzer-coverage-x86_64": Call Stack (most recent call first): Step #3 - "compile-libfuzzer-coverage-x86_64": kde-modules/KDEInstallDirs6.cmake:197 (ecm_query_qt) Step #3 - "compile-libfuzzer-coverage-x86_64": tests/ECMGeneratePkgConfigFile/test_imported_targets/CMakeLists.txt:11 (include) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring incomplete, errors occurred! Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image kcodecs Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 kcodecs Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1