starting build "9b66fe39-7e33-4058-812a-c9c52f32e0ea" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 18.94kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: 61e03ba1d414: Pulling fs layer Step #1: 4afb39f216bd: Pulling fs layer Step #1: e489abdc9f90: Pulling fs layer Step #1: 999fff7bcc24: Pulling fs layer Step #1: 890001cb98eb: Pulling fs layer Step #1: 93a73d1bfe9f: Pulling fs layer Step #1: 2cd82f573130: Pulling fs layer Step #1: 018dd55c8a2b: Pulling fs layer Step #1: e69cb4d181dd: Pulling fs layer Step #1: e5ee5f0eb117: Pulling fs layer Step #1: 404da060bff2: Pulling fs layer Step #1: 5905c7bb3d89: Pulling fs layer Step #1: 628a47352fe2: Pulling fs layer Step #1: c532a7b53856: Pulling fs layer Step #1: 09cd80b96daa: Pulling fs layer Step #1: 049d4d4b14be: Pulling fs layer Step #1: c6b86b053739: Pulling fs layer Step #1: 93a73d1bfe9f: Waiting Step #1: 890001cb98eb: Waiting Step #1: 24b887f5bc0c: Pulling fs layer Step #1: 018dd55c8a2b: Waiting Step #1: 999fff7bcc24: Waiting Step #1: e69cb4d181dd: Waiting Step #1: 355db2d8c197: Pulling fs layer Step #1: 404da060bff2: Waiting Step #1: a0e5ce02f5c2: Pulling fs layer Step #1: e5ee5f0eb117: Waiting Step #1: 5905c7bb3d89: Waiting Step #1: 3820eb103c59: Pulling fs layer Step #1: 2cd82f573130: Waiting Step #1: ff88c005c0f6: Pulling fs layer Step #1: 628a47352fe2: Waiting Step #1: c532a7b53856: Waiting Step #1: c6b86b053739: Waiting Step #1: 24b887f5bc0c: Waiting Step #1: ab933d16d6bd: Pulling fs layer Step #1: 61cdb333abc1: Pulling fs layer Step #1: 24d8cebe490d: Pulling fs layer Step #1: 475aa4ca7b2c: Pulling fs layer Step #1: 351220240f00: Pulling fs layer Step #1: 355db2d8c197: Waiting Step #1: 452bca804dad: Pulling fs layer Step #1: a0e5ce02f5c2: Waiting Step #1: 3820eb103c59: Waiting Step #1: 049d4d4b14be: Waiting Step #1: ff88c005c0f6: Waiting Step #1: 475aa4ca7b2c: Waiting Step #1: ab933d16d6bd: Waiting Step #1: 09cd80b96daa: Waiting Step #1: 24d8cebe490d: Waiting Step #1: 61cdb333abc1: Waiting Step #1: 452bca804dad: Waiting Step #1: 4afb39f216bd: Download complete Step #1: e489abdc9f90: Verifying Checksum Step #1: e489abdc9f90: Download complete Step #1: 999fff7bcc24: Verifying Checksum Step #1: 999fff7bcc24: Download complete Step #1: 93a73d1bfe9f: Verifying Checksum Step #1: 93a73d1bfe9f: Download complete Step #1: 61e03ba1d414: Verifying Checksum Step #1: 61e03ba1d414: Download complete Step #1: 018dd55c8a2b: Verifying Checksum Step #1: 018dd55c8a2b: Download complete Step #1: 2cd82f573130: Verifying Checksum Step #1: 2cd82f573130: Download complete Step #1: 890001cb98eb: Verifying Checksum Step #1: 890001cb98eb: Download complete Step #1: e5ee5f0eb117: Verifying Checksum Step #1: e5ee5f0eb117: Download complete Step #1: 5905c7bb3d89: Verifying Checksum Step #1: 5905c7bb3d89: Download complete Step #1: 628a47352fe2: Verifying Checksum Step #1: 628a47352fe2: Download complete Step #1: e69cb4d181dd: Verifying Checksum Step #1: e69cb4d181dd: Download complete Step #1: 61e03ba1d414: Pull complete Step #1: 4afb39f216bd: Pull complete Step #1: e489abdc9f90: Pull complete Step #1: 999fff7bcc24: Pull complete Step #1: 404da060bff2: Verifying Checksum Step #1: 404da060bff2: Download complete Step #1: 09cd80b96daa: Verifying Checksum Step #1: 09cd80b96daa: Download complete Step #1: c6b86b053739: Download complete Step #1: 24b887f5bc0c: Verifying Checksum Step #1: 24b887f5bc0c: Download complete Step #1: 355db2d8c197: Verifying Checksum Step #1: 355db2d8c197: Download complete Step #1: c532a7b53856: Verifying Checksum Step #1: c532a7b53856: Download complete Step #1: 890001cb98eb: Pull complete Step #1: 93a73d1bfe9f: Pull complete Step #1: 3820eb103c59: Verifying Checksum Step #1: 3820eb103c59: Download complete Step #1: a0e5ce02f5c2: Verifying Checksum Step #1: a0e5ce02f5c2: Download complete Step #1: ab933d16d6bd: Verifying Checksum Step #1: ab933d16d6bd: Download complete Step #1: 61cdb333abc1: Verifying Checksum Step #1: 61cdb333abc1: Download complete Step #1: 24d8cebe490d: Verifying Checksum Step #1: 24d8cebe490d: Download complete Step #1: 475aa4ca7b2c: Download complete Step #1: 351220240f00: Verifying Checksum Step #1: 351220240f00: Download complete Step #1: 049d4d4b14be: Verifying Checksum Step #1: 049d4d4b14be: Download complete Step #1: 2cd82f573130: Pull complete Step #1: 018dd55c8a2b: Pull complete Step #1: 452bca804dad: Verifying Checksum Step #1: 452bca804dad: Download complete Step #1: ff88c005c0f6: Verifying Checksum Step #1: ff88c005c0f6: Download complete Step #1: e69cb4d181dd: Pull complete Step #1: e5ee5f0eb117: Pull complete Step #1: 404da060bff2: Pull complete Step #1: 5905c7bb3d89: Pull complete Step #1: 628a47352fe2: Pull complete Step #1: c532a7b53856: Pull complete Step #1: 09cd80b96daa: Pull complete Step #1: 049d4d4b14be: Pull complete Step #1: c6b86b053739: Pull complete Step #1: 24b887f5bc0c: Pull complete Step #1: 355db2d8c197: Pull complete Step #1: a0e5ce02f5c2: Pull complete Step #1: 3820eb103c59: Pull complete Step #1: ff88c005c0f6: Pull complete Step #1: ab933d16d6bd: Pull complete Step #1: 61cdb333abc1: Pull complete Step #1: 24d8cebe490d: Pull complete Step #1: 475aa4ca7b2c: Pull complete Step #1: 351220240f00: Pull complete Step #1: 452bca804dad: Pull complete Step #1: Digest: sha256:2fee1b93f0112eaffb6281bd5c099f44f2ff66eb98aa71c52a569be88560b3d0 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 930dbb9ccc02 Step #1: Step 2/5 : COPY build.sh $SRC/ Step #1: ---> a3dff4b67325 Step #1: Step 3/5 : COPY ExampleFuzzerNative.h ExampleFuzzerNative.cpp $SRC/ Step #1: ---> 048aff2d8ec9 Step #1: Step 4/5 : COPY ExampleFuzzer.java ExampleValueProfileFuzzer.java ExampleFuzzerNative.java default.options $SRC/ Step #1: ---> 68415296c2a1 Step #1: Step 5/5 : WORKDIR $SRC/ Step #1: ---> Running in b59ad25d5caa Step #1: Removing intermediate container b59ad25d5caa Step #1: ---> 9b3599eb6e44 Step #1: Successfully built 9b3599eb6e44 Step #1: Successfully tagged gcr.io/oss-fuzz/java-example:latest Finished Step #1 Starting Step #2 Step #2: Already have image: gcr.io/oss-fuzz/java-example Step #2: ++ tempfile Step #2: + SRCMAP=/tmp/filehfUc32 Step #2: + echo '{}' Step #2: + PATHS_TO_SCAN=/src Step #2: + [[ jvm == \g\o ]] Step #2: ++ find /src -name .git -type d Step #2: + for DOT_GIT_DIR in '$(find $PATHS_TO_SCAN -name ".git" -type d)' Step #2: ++ dirname /src/aflplusplus/.git Step #2: + GIT_DIR=/src/aflplusplus Step #2: + cd /src/aflplusplus Step #2: ++ git config --get remote.origin.url Step #2: + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2: ++ git rev-parse HEAD Step #2: + GIT_REV=ade8cdca55951958024c86766453430f904381c5 Step #2: + jq_inplace /tmp/filehfUc32 '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "ade8cdca55951958024c86766453430f904381c5" }' Step #2: ++ tempfile Step #2: + F=/tmp/fileY7GPP1 Step #2: + cat /tmp/filehfUc32 Step #2: + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "ade8cdca55951958024c86766453430f904381c5" }' Step #2: + mv /tmp/fileY7GPP1 /tmp/filehfUc32 Step #2: ++ find /src -name .svn -type d Step #2: ++ find /src -name .hg -type d Step #2: + '[' '' '!=' '' ']' Step #2: + cat /tmp/filehfUc32 Step #2: + rm /tmp/filehfUc32 Step #2: { Step #2: "/src/aflplusplus": { Step #2: "type": "git", Step #2: "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2: "rev": "ade8cdca55951958024c86766453430f904381c5" Step #2: } Step #2: } Finished Step #2 Starting Step #3 Step #3: Already have image: gcr.io/oss-fuzz/java-example Step #3: --------------------------------------------------------------- Step #3: --------------------------------------------------------------- Step #3: CC=clang Step #3: CXX=clang++ Step #3: CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3: CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3: RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Zinstrument-coverage -C link-arg=-lc++ Step #3: --------------------------------------------------------------- Step #3: + JVM_INCLUDES='-I/usr/lib/jvm/java-15-openjdk-amd64/include -I/usr/lib/jvm/java-15-openjdk-amd64/include/linux' Step #3: + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -I/usr/lib/jvm/java-15-openjdk-amd64/include -I/usr/lib/jvm/java-15-openjdk-amd64/include/linux -fPIC -shared ExampleFuzzerNative.cpp -o /workspace/out/coverage/libnative.so Step #3: + BUILD_CLASSPATH=/usr/local/lib/jazzer_api_deploy.jar Step #3: + RUNTIME_CLASSPATH='$this_dir' Step #3: ++ find /src -name '*Fuzzer.java' -or -name '*FuzzerNative.java' Step #3: + for fuzzer in '$(find $SRC -name '\''*Fuzzer.java'\'' -or -name '\''*FuzzerNative.java'\'')' Step #3: ++ basename -s .java /src/ExampleValueProfileFuzzer.java Step #3: + fuzzer_basename=ExampleValueProfileFuzzer Step #3: + javac -cp /usr/local/lib/jazzer_api_deploy.jar /src/ExampleValueProfileFuzzer.java Step #3: + cp /src/ExampleValueProfileFuzzer.class /workspace/out/coverage/ Step #3: + [[ ExampleValueProfileFuzzer == *FuzzerNative ]] Step #3: + driver=jazzer_driver Step #3: + cp default.options /workspace/out/coverage/ExampleValueProfileFuzzer.options Step #3: + echo '#!/bin/sh Step #3: # LLVMFuzzerTestOneInput for fuzzer detection. Step #3: this_dir=$(dirname "$0") Step #3: LD_LIBRARY_PATH="/usr/lib/jvm/java-15-openjdk-amd64/lib/server":$this_dir ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/jazzer_driver --agent_path=$this_dir/jazzer_agent_deploy.jar --cp=$this_dir --target_class=ExampleValueProfileFuzzer --jvm_args="-Xmx2048m" $@' Step #3: + chmod +x /workspace/out/coverage/ExampleValueProfileFuzzer Step #3: + for fuzzer in '$(find $SRC -name '\''*Fuzzer.java'\'' -or -name '\''*FuzzerNative.java'\'')' Step #3: ++ basename -s .java /src/ExampleFuzzer.java Step #3: + fuzzer_basename=ExampleFuzzer Step #3: + javac -cp /usr/local/lib/jazzer_api_deploy.jar /src/ExampleFuzzer.java Step #3: + cp /src/ExampleFuzzer.class /workspace/out/coverage/ Step #3: + [[ ExampleFuzzer == *FuzzerNative ]] Step #3: + driver=jazzer_driver Step #3: + cp default.options /workspace/out/coverage/ExampleFuzzer.options Step #3: + echo '#!/bin/sh Step #3: # LLVMFuzzerTestOneInput for fuzzer detection. Step #3: this_dir=$(dirname "$0") Step #3: LD_LIBRARY_PATH="/usr/lib/jvm/java-15-openjdk-amd64/lib/server":$this_dir ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/jazzer_driver --agent_path=$this_dir/jazzer_agent_deploy.jar --cp=$this_dir --target_class=ExampleFuzzer --jvm_args="-Xmx2048m" $@' Step #3: + chmod +x /workspace/out/coverage/ExampleFuzzer Step #3: + for fuzzer in '$(find $SRC -name '\''*Fuzzer.java'\'' -or -name '\''*FuzzerNative.java'\'')' Step #3: ++ basename -s .java /src/ExampleFuzzerNative.java Step #3: + fuzzer_basename=ExampleFuzzerNative Step #3: + javac -cp /usr/local/lib/jazzer_api_deploy.jar /src/ExampleFuzzerNative.java Step #3: + cp /src/ExampleFuzzerNative.class /workspace/out/coverage/ Step #3: + [[ ExampleFuzzerNative == *FuzzerNative ]] Step #3: + driver=jazzer_driver_with_sanitizer Step #3: + cp default.options /workspace/out/coverage/ExampleFuzzerNative.options Step #3: + echo '#!/bin/sh Step #3: # LLVMFuzzerTestOneInput for fuzzer detection. Step #3: this_dir=$(dirname "$0") Step #3: LD_LIBRARY_PATH="/usr/lib/jvm/java-15-openjdk-amd64/lib/server":$this_dir ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/jazzer_driver_with_sanitizer --agent_path=$this_dir/jazzer_agent_deploy.jar --cp=$this_dir --target_class=ExampleFuzzerNative --jvm_args="-Xmx2048m" $@' Step #3: + chmod +x /workspace/out/coverage/ExampleFuzzerNative Finished Step #3 Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: 61e03ba1d414: Already exists Step #4: 4afb39f216bd: Already exists Step #4: e489abdc9f90: Already exists Step #4: 999fff7bcc24: Already exists Step #4: 890001cb98eb: Already exists Step #4: 93a73d1bfe9f: Already exists Step #4: b366aed7ee2a: Pulling fs layer Step #4: b998bd2baf51: Pulling fs layer Step #4: bb3ed50c5f2f: Pulling fs layer Step #4: cdd62e553572: Pulling fs layer Step #4: 72ed41a205bf: Pulling fs layer Step #4: dd66a85dbdd2: Pulling fs layer Step #4: 9aa08f369805: Pulling fs layer Step #4: 72a5a3d937d3: Pulling fs layer Step #4: a0e6ab448e7f: Pulling fs layer Step #4: f49a6ac26758: Pulling fs layer Step #4: 299454c67e16: Pulling fs layer Step #4: 107d88b07060: Pulling fs layer Step #4: a0e6ab448e7f: Waiting Step #4: f49a6ac26758: Waiting Step #4: 72ed41a205bf: Waiting Step #4: dd66a85dbdd2: Waiting Step #4: 299454c67e16: Waiting Step #4: 9aa08f369805: Waiting Step #4: 72a5a3d937d3: Waiting Step #4: 107d88b07060: Waiting Step #4: cdd62e553572: Waiting Step #4: b998bd2baf51: Verifying Checksum Step #4: b998bd2baf51: Download complete Step #4: b366aed7ee2a: Verifying Checksum Step #4: b366aed7ee2a: Download complete Step #4: b366aed7ee2a: Pull complete Step #4: 72ed41a205bf: Verifying Checksum Step #4: 72ed41a205bf: Download complete Step #4: 9aa08f369805: Verifying Checksum Step #4: 9aa08f369805: Download complete Step #4: b998bd2baf51: Pull complete Step #4: bb3ed50c5f2f: Verifying Checksum Step #4: bb3ed50c5f2f: Download complete Step #4: 72a5a3d937d3: Verifying Checksum Step #4: 72a5a3d937d3: Download complete Step #4: f49a6ac26758: Verifying Checksum Step #4: f49a6ac26758: Download complete Step #4: 299454c67e16: Verifying Checksum Step #4: 299454c67e16: Download complete Step #4: 107d88b07060: Verifying Checksum Step #4: 107d88b07060: Download complete Step #4: a0e6ab448e7f: Verifying Checksum Step #4: a0e6ab448e7f: Download complete Step #4: dd66a85dbdd2: Verifying Checksum Step #4: dd66a85dbdd2: Download complete Step #4: bb3ed50c5f2f: Pull complete Step #4: cdd62e553572: Pull complete Step #4: 72ed41a205bf: Pull complete Step #4: dd66a85dbdd2: Pull complete Step #4: 9aa08f369805: Pull complete Step #4: 72a5a3d937d3: Pull complete Step #4: a0e6ab448e7f: Pull complete Step #4: f49a6ac26758: Pull complete Step #4: 299454c67e16: Pull complete Step #4: 107d88b07060: Pull complete Step #4: Digest: sha256:190653d3742ebdd363f993012452cc9deda5bd3206d5a419a2b9175b1aa3ef88 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running ExampleFuzzer Step #5: Running ExampleFuzzerNative Step #5: Running ExampleValueProfileFuzzer Step #5: Error occured while running ExampleFuzzerNative: Step #5: /workspace/out/coverage/ExampleFuzzerNative: 4: /workspace/out/coverage/ExampleFuzzerNative: /workspace/out/coverage/jazzer_driver_with_sanitizer: not found Step #5: du: cannot access '/workspace/out/coverage/dumps/ExampleFuzzerNative.exec': No such file or directory Step #5: [INFO] Loading execution data file /workspace/out/coverage/dumps/ExampleValueProfileFuzzer.exec. Step #5: [INFO] Loading execution data file /workspace/out/coverage/dumps/ExampleFuzzer.exec. Step #5: [INFO] Analyzing 1 classes. Step #5: [INFO] Analyzing 1 classes. Step #5: [INFO] Loading execution data file /workspace/out/coverage/dumps/ExampleFuzzer.exec. Step #5: [INFO] Loading execution data file /workspace/out/coverage/dumps/ExampleValueProfileFuzzer.exec. Step #5: [INFO] Writing execution data to /workspace/out/coverage/dumps/jacoco.merged.exec. Step #5: cp: cannot stat '/workspace/out/coverage/dumps/ExampleFuzzerNative_classes/*': No such file or directory Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image java-example Step #5: python infra/helper.py build_fuzzers --sanitizer coverage java-example Step #5: python infra/helper.py coverage java-example Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1