starting build "9ca5a593-79dd-4ebe-9e92-dd61a7144dcc" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 15.87kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 81271cf7a52d: Pulling fs layer Step #1: 076e7ea7d2be: Pulling fs layer Step #1: f972795033e0: Pulling fs layer Step #1: 955fcbf34e0c: Pulling fs layer Step #1: 3d3d7fb65ba7: Pulling fs layer Step #1: 174afde8b08f: Pulling fs layer Step #1: 45de6e62747b: Pulling fs layer Step #1: e2d79d747ed8: Pulling fs layer Step #1: ae4e2bcce13c: Pulling fs layer Step #1: 7ebb7f4ef4ba: Pulling fs layer Step #1: a3f19c78a4e0: Pulling fs layer Step #1: d5a5e8ce33af: Pulling fs layer Step #1: 73be63f18a2d: Pulling fs layer Step #1: 26e1ff8f4610: Pulling fs layer Step #1: ebd8249059d4: Pulling fs layer Step #1: f46125ccc6bc: Pulling fs layer Step #1: 1e6f40e53d7f: Pulling fs layer Step #1: bb416e3a2055: Pulling fs layer Step #1: 20b4f3764835: Pulling fs layer Step #1: 3cb217e698e8: Pulling fs layer Step #1: 17edcc97785b: Pulling fs layer Step #1: da6fa1422508: Pulling fs layer Step #1: 236229e44656: Pulling fs layer Step #1: fff17b067246: Pulling fs layer Step #1: e667c6c012a1: Pulling fs layer Step #1: 1c6dc0c7729f: Pulling fs layer Step #1: 50e898cc1c8e: Pulling fs layer Step #1: db7af1b26c60: Pulling fs layer Step #1: f96a58b6493f: Pulling fs layer Step #1: e2d79d747ed8: Waiting Step #1: 26e1ff8f4610: Waiting Step #1: f972795033e0: Waiting Step #1: 236229e44656: Waiting Step #1: 955fcbf34e0c: Waiting Step #1: fff17b067246: Waiting Step #1: ae4e2bcce13c: Waiting Step #1: e667c6c012a1: Waiting Step #1: 3d3d7fb65ba7: Waiting Step #1: 1c6dc0c7729f: Waiting Step #1: 7ebb7f4ef4ba: Waiting Step #1: 174afde8b08f: Waiting Step #1: 45de6e62747b: Waiting Step #1: a3f19c78a4e0: Waiting Step #1: f96a58b6493f: Waiting Step #1: 50e898cc1c8e: Waiting Step #1: d5a5e8ce33af: Waiting Step #1: db7af1b26c60: Waiting Step #1: 20b4f3764835: Waiting Step #1: 73be63f18a2d: Waiting Step #1: 3cb217e698e8: Waiting Step #1: ebd8249059d4: Waiting Step #1: 17edcc97785b: Waiting Step #1: bb416e3a2055: Waiting Step #1: 076e7ea7d2be: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f972795033e0: Verifying Checksum Step #1: f972795033e0: Download complete Step #1: 955fcbf34e0c: Verifying Checksum Step #1: 955fcbf34e0c: Download complete Step #1: 3d3d7fb65ba7: Verifying Checksum Step #1: 3d3d7fb65ba7: Download complete Step #1: 45de6e62747b: Verifying Checksum Step #1: e2d79d747ed8: Verifying Checksum Step #1: e2d79d747ed8: Download complete Step #1: 81271cf7a52d: Verifying Checksum Step #1: 81271cf7a52d: Download complete Step #1: 7ebb7f4ef4ba: Verifying Checksum Step #1: 7ebb7f4ef4ba: Download complete Step #1: a3f19c78a4e0: Verifying Checksum Step #1: a3f19c78a4e0: Download complete Step #1: d5a5e8ce33af: Verifying Checksum Step #1: d5a5e8ce33af: Download complete Step #1: 73be63f18a2d: Verifying Checksum Step #1: 73be63f18a2d: Download complete Step #1: 26e1ff8f4610: Verifying Checksum Step #1: 26e1ff8f4610: Download complete Step #1: b549f31133a9: Pull complete Step #1: ebd8249059d4: Verifying Checksum Step #1: ebd8249059d4: Download complete Step #1: f46125ccc6bc: Verifying Checksum Step #1: f46125ccc6bc: Download complete Step #1: 1e6f40e53d7f: Verifying Checksum Step #1: 1e6f40e53d7f: Download complete Step #1: bb416e3a2055: Verifying Checksum Step #1: bb416e3a2055: Download complete Step #1: 20b4f3764835: Verifying Checksum Step #1: 20b4f3764835: Download complete Step #1: ae4e2bcce13c: Verifying Checksum Step #1: ae4e2bcce13c: Download complete Step #1: 3cb217e698e8: Verifying Checksum Step #1: 3cb217e698e8: Download complete Step #1: da6fa1422508: Verifying Checksum Step #1: da6fa1422508: Download complete Step #1: 17edcc97785b: Verifying Checksum Step #1: 17edcc97785b: Download complete Step #1: 236229e44656: Verifying Checksum Step #1: 236229e44656: Download complete Step #1: fff17b067246: Verifying Checksum Step #1: fff17b067246: Download complete Step #1: e667c6c012a1: Verifying Checksum Step #1: e667c6c012a1: Download complete Step #1: 1c6dc0c7729f: Verifying Checksum Step #1: 1c6dc0c7729f: Download complete Step #1: 50e898cc1c8e: Verifying Checksum Step #1: 50e898cc1c8e: Download complete Step #1: f96a58b6493f: Verifying Checksum Step #1: f96a58b6493f: Download complete Step #1: db7af1b26c60: Download complete Step #1: 174afde8b08f: Verifying Checksum Step #1: 174afde8b08f: Download complete Step #1: 81271cf7a52d: Pull complete Step #1: 076e7ea7d2be: Pull complete Step #1: f972795033e0: Pull complete Step #1: 955fcbf34e0c: Pull complete Step #1: 3d3d7fb65ba7: Pull complete Step #1: 174afde8b08f: Pull complete Step #1: 45de6e62747b: Pull complete Step #1: e2d79d747ed8: Pull complete Step #1: ae4e2bcce13c: Pull complete Step #1: 7ebb7f4ef4ba: Pull complete Step #1: a3f19c78a4e0: Pull complete Step #1: d5a5e8ce33af: Pull complete Step #1: 73be63f18a2d: Pull complete Step #1: 26e1ff8f4610: Pull complete Step #1: ebd8249059d4: Pull complete Step #1: f46125ccc6bc: Pull complete Step #1: 1e6f40e53d7f: Pull complete Step #1: bb416e3a2055: Pull complete Step #1: 20b4f3764835: Pull complete Step #1: 3cb217e698e8: Pull complete Step #1: 17edcc97785b: Pull complete Step #1: da6fa1422508: Pull complete Step #1: 236229e44656: Pull complete Step #1: fff17b067246: Pull complete Step #1: e667c6c012a1: Pull complete Step #1: 1c6dc0c7729f: Pull complete Step #1: 50e898cc1c8e: Pull complete Step #1: db7af1b26c60: Pull complete Step #1: f96a58b6493f: Pull complete Step #1: Digest: sha256:5e4a33eb0d8264da878ce067e18e6b052848519a00ef0f3ef2a2c02bc73b4bfc Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> da6d69e7deff Step #1: Step 2/6 : RUN apt-get update && apt-get install -y make Step #1: ---> Running in 7794d29b4ced Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (210 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #1: Removing intermediate container 7794d29b4ced Step #1: ---> 75ac65628fec Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/bellard/quickjs quickjs Step #1: ---> Running in 866b6d941ccb Step #1: Cloning into 'quickjs'... Step #1: Removing intermediate container 866b6d941ccb Step #1: ---> f2b8b6b62db1 Step #1: Step 4/6 : WORKDIR $SRC/quickjs Step #1: ---> Running in 49325177070d Step #1: Removing intermediate container 49325177070d Step #1: ---> edcb32b152a7 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> dd8d835a7871 Step #1: Step 6/6 : COPY fuzz*.c $SRC/ Step #1: ---> 33d0758c258f Step #1: Successfully built 33d0758c258f Step #1: Successfully tagged gcr.io/oss-fuzz/quickjs:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/quickjs Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileWPKbkQ Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/quickjs/.git Step #2 - "srcmap": + GIT_DIR=/src/quickjs Step #2 - "srcmap": + cd /src/quickjs Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/bellard/quickjs Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=e140122202cc24728b394f8f90fa2f4a2d7c397e Step #2 - "srcmap": + jq_inplace /tmp/fileWPKbkQ '."/src/quickjs" = { type: "git", url: "https://github.com/bellard/quickjs", rev: "e140122202cc24728b394f8f90fa2f4a2d7c397e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filetXC9Ya Step #2 - "srcmap": + cat /tmp/fileWPKbkQ Step #2 - "srcmap": + jq '."/src/quickjs" = { type: "git", url: "https://github.com/bellard/quickjs", rev: "e140122202cc24728b394f8f90fa2f4a2d7c397e" }' Step #2 - "srcmap": + mv /tmp/filetXC9Ya /tmp/fileWPKbkQ Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileWPKbkQ Step #2 - "srcmap": + rm /tmp/fileWPKbkQ Step #2 - "srcmap": { Step #2 - "srcmap": "/src/quickjs": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/bellard/quickjs", Step #2 - "srcmap": "rev": "e140122202cc24728b394f8f90fa2f4a2d7c397e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/CFLAGS=/CFLAGS+=/ Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": + CONFIG_CLANG=y Step #3 - "compile-libfuzzer-coverage-x86_64": + make libquickjs.a Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir -p .obj .obj/examples .obj/tests Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/quickjs.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/quickjs.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/quickjs.o quickjs.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/libregexp.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/libregexp.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/libregexp.o libregexp.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/libunicode.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/libunicode.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/libunicode.o libunicode.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/cutils.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/cutils.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/cutils.o cutils.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/quickjs-libc.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/quickjs-libc.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/quickjs-libc.o quickjs-libc.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -g -Wall -MMD -MF .obj/libbf.o.d -Wextra -Wno-sign-compare -Wno-missing-field-initializers -Wundef -Wuninitialized -Wunused -Wno-unused-parameter -Wwrite-strings -Wchar-subscripts -funsigned-char -MMD -MF .obj/libbf.o.d -fwrapv -D_GNU_SOURCE -DCONFIG_VERSION=\"2024-01-13\" -DCONFIG_BIGNUM -O2 -c -o .obj/libbf.o libbf.c Step #3 - "compile-libfuzzer-coverage-x86_64": ar rcs libquickjs.a .obj/quickjs.o .obj/libregexp.o .obj/libunicode.o .obj/cutils.o .obj/quickjs-libc.o .obj/libbf.o Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_eval_seed_corpus.zip tests/microbench.js tests/test_bignum.js tests/test_bjson.js tests/test_builtin.js tests/test_closure.js tests/test_language.js tests/test_loop.js tests/test_op_overloading.js tests/test_qjscalc.js tests/test_std.js tests/test_worker.js tests/test_worker_module.js Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/microbench.js (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_bignum.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_bjson.js (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_builtin.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_closure.js (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_language.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_loop.js (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_op_overloading.js (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_qjscalc.js (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_std.js (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_worker.js (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_worker_module.js (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_eval_seed_corpus.zip examples/fib_module.js examples/hello.js examples/hello_module.js examples/pi_bigdecimal.js examples/pi_bigfloat.js examples/pi_bigint.js examples/test_fib.js examples/test_point.js Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/fib_module.js (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/hello.js (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/hello_module.js (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigdecimal.js (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigfloat.js (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigint.js (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/test_fib.js (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/test_point.js (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_compile_seed_corpus.zip tests/microbench.js tests/test_bignum.js tests/test_bjson.js tests/test_builtin.js tests/test_closure.js tests/test_language.js tests/test_loop.js tests/test_op_overloading.js tests/test_qjscalc.js tests/test_std.js tests/test_worker.js tests/test_worker_module.js Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/microbench.js (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_bignum.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_bjson.js (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_builtin.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_closure.js (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_language.js (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_loop.js (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_op_overloading.js (deflated 80%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_qjscalc.js (deflated 63%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_std.js (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_worker.js (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: tests/test_worker_module.js (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_compile_seed_corpus.zip examples/fib_module.js examples/hello.js examples/hello_module.js examples/pi_bigdecimal.js examples/pi_bigfloat.js examples/pi_bigint.js examples/test_fib.js examples/test_point.js Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/fib_module.js (deflated 39%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/hello.js (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/hello_module.js (deflated 19%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigdecimal.js (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigfloat.js (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/pi_bigint.js (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/test_fib.js (deflated 21%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: examples/test_point.js (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": + cd .. Step #3 - "compile-libfuzzer-coverage-x86_64": + FUZZ_TARGETS='fuzz_eval fuzz_compile fuzz_regexp' Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -Iquickjs -c fuzz_eval.c -o fuzz_eval.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ fuzz_eval.o -o /workspace/out/libfuzzer-coverage-x86_64/fuzz_eval quickjs/libquickjs.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -Iquickjs -c fuzz_compile.c -o fuzz_compile.o Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ fuzz_compile.o -o /workspace/out/libfuzzer-coverage-x86_64/fuzz_compile quickjs/libquickjs.a -fsanitize=fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + for f in $FUZZ_TARGETS Step #3 - "compile-libfuzzer-coverage-x86_64": + clang -O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -Iquickjs -c fuzz_regexp.c -o fuzz_regexp.o Step #3 - "compile-libfuzzer-coverage-x86_64": In file included from fuzz_regexp.c:16: Step #3 - "compile-libfuzzer-coverage-x86_64": In file included from quickjs/libregexp.h:29: Step #3 - "compile-libfuzzer-coverage-x86_64": quickjs/libunicode.h:44:34: error: unknown type name 'BOOL' Step #3 - "compile-libfuzzer-coverage-x86_64": int lre_canonicalize(uint32_t c, BOOL is_unicode); Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": quickjs/libunicode.h:105:43: error: unknown type name 'BOOL' Step #3 - "compile-libfuzzer-coverage-x86_64": int cr_regexp_canonicalize(CharRange *cr, BOOL is_unicode); Step #3 - "compile-libfuzzer-coverage-x86_64":  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": 2 errors generated. Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image quickjs Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 quickjs Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1