starting build "9f26d2f7-171f-4ee2-9de2-8fd9084b4d62" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 6becd2001539: Pulling fs layer Step #1: 22d4835417b0: Pulling fs layer Step #1: 601a9cbfd137: Pulling fs layer Step #1: 972df7da24e8: Pulling fs layer Step #1: 1fb4fb3d2b01: Waiting Step #1: 535ecd0613d1: Pulling fs layer Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: c19b7fe83e8a: Pulling fs layer Step #1: 50e1ee57936a: Waiting Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: b46b6cdbb6f2: Waiting Step #1: bcf869ca811e: Pulling fs layer Step #1: 4a49dc7a9851: Pulling fs layer Step #1: 23e3013e5b98: Waiting Step #1: c0d18e8fb1fa: Waiting Step #1: a7d3a0578149: Waiting Step #1: 29a663a40ba4: Waiting Step #1: 22d4835417b0: Waiting Step #1: d57e2535d3c0: Waiting Step #1: 601a9cbfd137: Waiting Step #1: 972df7da24e8: Waiting Step #1: e530a9eecf2b: Waiting Step #1: de9ad109123c: Pulling fs layer Step #1: d74dccfeea37: Pulling fs layer Step #1: 535ecd0613d1: Waiting Step #1: 9650ce23f886: Pulling fs layer Step #1: eaeb815cd75a: Pulling fs layer Step #1: 6becd2001539: Waiting Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: 11c03f65d6c1: Pulling fs layer Step #1: ec67c84a6d76: Waiting Step #1: 8bb7dd1116ca: Waiting Step #1: 16949380c6e4: Waiting Step #1: da4104990ff0: Waiting Step #1: de9ad109123c: Waiting Step #1: 4f27abcdaf5d: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: c19b7fe83e8a: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: 81adce140048: Waiting Step #1: 1eaaa1542342: Waiting Step #1: 3c6277aa8e2b: Waiting Step #1: d74dccfeea37: Waiting Step #1: eaeb815cd75a: Waiting Step #1: 4a49dc7a9851: Waiting Step #1: bcf869ca811e: Waiting Step #1: 38da3118a46e: Verifying Checksum Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: 1fb4fb3d2b01: Download complete Step #1: 51df0d6876cd: Download complete Step #1: 50e1ee57936a: Verifying Checksum Step #1: 50e1ee57936a: Download complete Step #1: 23e3013e5b98: Download complete Step #1: b549f31133a9: Pull complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: 81adce140048: Download complete Step #1: b46b6cdbb6f2: Verifying Checksum Step #1: b46b6cdbb6f2: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 22d4835417b0: Verifying Checksum Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Verifying Checksum Step #1: 535ecd0613d1: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: da4104990ff0: Verifying Checksum Step #1: da4104990ff0: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: c19b7fe83e8a: Download complete Step #1: 3c6277aa8e2b: Verifying Checksum Step #1: 3c6277aa8e2b: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: 9650ce23f886: Download complete Step #1: eaeb815cd75a: Verifying Checksum Step #1: eaeb815cd75a: Download complete Step #1: 11c03f65d6c1: Verifying Checksum Step #1: 11c03f65d6c1: Download complete Step #1: 3ccdc7b565ee: Verifying Checksum Step #1: 3ccdc7b565ee: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 38da3118a46e: Pull complete Step #1: ec67c84a6d76: Pull complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: Digest: sha256:718d1e1f9fed057967ab647b50af41708389951cff904f6fdaac999ad1b3973e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 01958c5bb573 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y ninja-build wget Step #1: ---> Running in 9f88c049c7cb Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (135 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: Suggested packages: Step #1: python3 Step #1: The following NEW packages will be installed: Step #1: ninja-build Step #1: 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 107 kB of archives. Step #1: After this operation, 338 kB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 107 kB in 0s (375 kB/s) Step #1: Selecting previously unselected package ninja-build. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../ninja-build_1.10.0-1build1_amd64.deb ... Step #1: Unpacking ninja-build (1.10.0-1build1) ... Step #1: Setting up ninja-build (1.10.0-1build1) ... Step #1: Removing intermediate container 9f88c049c7cb Step #1: ---> d741a900bde1 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/simdjson/simdjson.git simdjson Step #1: ---> Running in b992e87502db Step #1: Cloning into 'simdjson'... Step #1: Removing intermediate container b992e87502db Step #1: ---> e4744667ea43 Step #1: Step 4/5 : WORKDIR simdjson Step #1: ---> Running in 269b4957b284 Step #1: Removing intermediate container 269b4957b284 Step #1: ---> d1036fd216a0 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 2ee40eb91a67 Step #1: Successfully built 2ee40eb91a67 Step #1: Successfully tagged gcr.io/oss-fuzz/simdjson:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/simdjson Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileCF3FnP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/simdjson/.git Step #2 - "srcmap": + GIT_DIR=/src/simdjson Step #2 - "srcmap": + cd /src/simdjson Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/simdjson/simdjson.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9b314922a1f5ecbda366115992893e368cd2f0e0 Step #2 - "srcmap": + jq_inplace /tmp/fileCF3FnP '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "9b314922a1f5ecbda366115992893e368cd2f0e0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filePAKB19 Step #2 - "srcmap": + cat /tmp/fileCF3FnP Step #2 - "srcmap": + jq '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "9b314922a1f5ecbda366115992893e368cd2f0e0" }' Step #2 - "srcmap": + mv /tmp/filePAKB19 /tmp/fileCF3FnP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileCF3FnP Step #2 - "srcmap": + rm /tmp/fileCF3FnP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/simdjson": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/simdjson/simdjson.git", Step #2 - "srcmap": "rev": "9b314922a1f5ecbda366115992893e368cd2f0e0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-afl-address-x86_64" Step #3 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #3 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #3 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #3 - "compile-afl-address-x86_64": Step #3 - "compile-afl-address-x86_64": done. Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #3 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #3 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #3 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #3 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-afl-address-x86_64": + fuzz/ossfuzz.sh Step #3 - "compile-afl-address-x86_64": + which zip Step #3 - "compile-afl-address-x86_64": + which cmake Step #3 - "compile-afl-address-x86_64": + which ninja Step #3 - "compile-afl-address-x86_64": + fuzz/build_corpus.sh Step #3 - "compile-afl-address-x86_64": + mkdir -p build Step #3 - "compile-afl-address-x86_64": + cd build Step #3 - "compile-afl-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #3 - "compile-afl-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-afl-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-afl-address-x86_64": -- Check for working CXX compiler: /src/aflplusplus/afl-clang-fast++ - skipped Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compile features Step #3 - "compile-afl-address-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-afl-address-x86_64": -- Check for working C compiler: /src/aflplusplus/afl-clang-fast - skipped Step #3 - "compile-afl-address-x86_64": -- Detecting C compile features Step #3 - "compile-afl-address-x86_64": -- Detecting C compile features - done Step #3 - "compile-afl-address-x86_64": -- Looking for fork Step #3 - "compile-afl-address-x86_64": -- Looking for fork - found Step #3 - "compile-afl-address-x86_64": -- Looking for wait Step #3 - "compile-afl-address-x86_64": -- Looking for wait - found Step #3 - "compile-afl-address-x86_64": -- Adding -Og to compile flag Step #3 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-afl-address-x86_64": -- Found Threads: TRUE Step #3 - "compile-afl-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #3 - "compile-afl-address-x86_64": -- CPM: Adding package cxxopts@ () Step #3 - "compile-afl-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #3 - "compile-afl-address-x86_64": -- Found Python3: /usr/local/bin/python3.8 (found version "3.8.3") found components: Interpreter Step #3 - "compile-afl-address-x86_64": -- Including amalgamate_demo test. Step #3 - "compile-afl-address-x86_64": -- Including simdjson-singleheader test. Step #3 - "compile-afl-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #3 - "compile-afl-address-x86_64": -- We disable the checkperf targets under Ninja. Step #3 - "compile-afl-address-x86_64": -- Configuring done (4.6s) Step #3 - "compile-afl-address-x86_64": -- Generating done (0.1s) Step #3 - "compile-afl-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #3 - "compile-afl-address-x86_64": + cmake --build . --target all_fuzzers Step #3 - "compile-afl-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_minify [17/28] Linking CXX executable fuzz/fuzz_ondemand [18/28] Linking CXX executable fuzz/fuzz_atpointer [19/28] Linking CXX executable fuzz/fuzz_parser [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump [23/28] Linking CXX executable fuzz/fuzz_element [24/28] Linking CXX executable fuzz/fuzz_print_json [25/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [26/28] Linking CXX executable fuzz/fuzz_minifyimpl [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_utf8 Step #3 - "compile-afl-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/afl-address-x86_64 Step #3 - "compile-afl-address-x86_64": + ls /workspace/out/afl-address-x86_64/fuzz_atpointer /workspace/out/afl-address-x86_64/fuzz_dump /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape /workspace/out/afl-address-x86_64/fuzz_element /workspace/out/afl-address-x86_64/fuzz_implementations /workspace/out/afl-address-x86_64/fuzz_minify /workspace/out/afl-address-x86_64/fuzz_minifyimpl /workspace/out/afl-address-x86_64/fuzz_ndjson /workspace/out/afl-address-x86_64/fuzz_ondemand /workspace/out/afl-address-x86_64/fuzz_padded /workspace/out/afl-address-x86_64/fuzz_parser /workspace/out/afl-address-x86_64/fuzz_print_json /workspace/out/afl-address-x86_64/fuzz_utf8 Step #3 - "compile-afl-address-x86_64": + grep -v .zip$ Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_atpointer Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_atpointer.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_element Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_element.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_implementations Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_implementations.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minify Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minify.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minifyimpl Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minifyimpl.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ndjson Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ndjson.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ondemand Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ondemand.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_padded Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_padded.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_parser Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_parser.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_print_json Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_print_json.zip Step #3 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_utf8 Step #3 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_utf8.zip Finished Step #3 - "compile-afl-address-x86_64" Starting Step #4 - "build-check-afl-address-x86_64" Step #4 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-afl-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-afl-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-afl-address-x86_64": 51df0d6876cd: Already exists Step #4 - "build-check-afl-address-x86_64": 38da3118a46e: Already exists Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": a6399624745a: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Pulling fs layer Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Waiting Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Waiting Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Waiting Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Waiting Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Waiting Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Waiting Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Waiting Step #4 - "build-check-afl-address-x86_64": a6399624745a: Waiting Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Waiting Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Waiting Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Waiting Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Download complete Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Download complete Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Download complete Step #4 - "build-check-afl-address-x86_64": 76485c50adab: Pull complete Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Download complete Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Download complete Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Download complete Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Download complete Step #4 - "build-check-afl-address-x86_64": 6e454ec0415e: Pull complete Step #4 - "build-check-afl-address-x86_64": fcc56198b7b3: Pull complete Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Download complete Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Download complete Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Download complete Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Download complete Step #4 - "build-check-afl-address-x86_64": a6399624745a: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": a6399624745a: Download complete Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Download complete Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Download complete Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Download complete Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Download complete Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Verifying Checksum Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Download complete Step #4 - "build-check-afl-address-x86_64": 839d42049c75: Pull complete Step #4 - "build-check-afl-address-x86_64": 9b7f47b799be: Pull complete Step #4 - "build-check-afl-address-x86_64": 885b716fb19d: Pull complete Step #4 - "build-check-afl-address-x86_64": 1f82e1e2eaac: Pull complete Step #4 - "build-check-afl-address-x86_64": 3582fe5817de: Pull complete Step #4 - "build-check-afl-address-x86_64": a221f9a44ef5: Pull complete Step #4 - "build-check-afl-address-x86_64": e9f45d43ad23: Pull complete Step #4 - "build-check-afl-address-x86_64": db56863ee7be: Pull complete Step #4 - "build-check-afl-address-x86_64": 84816e0f3769: Pull complete Step #4 - "build-check-afl-address-x86_64": a6399624745a: Pull complete Step #4 - "build-check-afl-address-x86_64": 0715e4009fac: Pull complete Step #4 - "build-check-afl-address-x86_64": 4e5763569d03: Pull complete Step #4 - "build-check-afl-address-x86_64": 7f4c947f7af3: Pull complete Step #4 - "build-check-afl-address-x86_64": 30d1cf1bf2b4: Pull complete Step #4 - "build-check-afl-address-x86_64": Digest: sha256:cb894d78b81942499e77d79f91f562ce74c084f3ca1001f2c72a30e5404d1f69 Step #4 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_print_json Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_atpointer Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_minifyimpl Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_padded Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_dump Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_dump_raw_tape Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_minify Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_ondemand Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_element Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_ndjson Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_parser Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_implementations Step #4 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpo997b6b8/fuzz_utf8 Finished Step #4 - "build-check-afl-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/simdjson Step #6: adding: SanitizerCoverageLTO.so (deflated 70%) Step #6: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #6: adding: afl-addseeds (deflated 56%) Step #6: adding: afl-analyze (deflated 54%) Step #6: adding: afl-as (deflated 63%) Step #6: adding: afl-c++ (deflated 57%) Step #6: adding: afl-c++.8 (deflated 56%) Step #6: adding: afl-cc (deflated 57%) Step #6: adding: afl-cc.8 (deflated 56%) Step #6: adding: afl-clang (deflated 57%) Step #6: adding: afl-clang++ (deflated 57%) Step #6: adding: afl-clang-fast (deflated 57%) Step #6: adding: afl-clang-fast++ (deflated 57%) Step #6: adding: afl-clang-fast++.8 (deflated 56%) Step #6: adding: afl-clang-fast.8 (deflated 56%) Step #6: adding: afl-clang-lto (deflated 57%) Step #6: adding: afl-clang-lto++ (deflated 57%) Step #6: adding: afl-clang-lto++.8 (deflated 56%) Step #6: adding: afl-clang-lto.8 (deflated 56%) Step #6: adding: afl-cmin (deflated 70%) Step #6: adding: afl-cmin.bash (deflated 65%) Step #6: adding: afl-compiler-rt-32.o (deflated 56%) Step #6: adding: afl-compiler-rt-64.o (deflated 67%) Step #6: adding: afl-compiler-rt.o (deflated 67%) Step #6: adding: afl-fuzz (deflated 55%) Step #6: adding: afl-g++ (deflated 57%) Step #6: adding: afl-gcc (deflated 57%) Step #6: adding: afl-gotcpu (deflated 61%) Step #6: adding: afl-ld-lto (deflated 63%) Step #6: adding: afl-llvm-dict2file.so (deflated 69%) Step #6: adding: afl-llvm-lto-instrumentlist.so (deflated 70%) Step #6: adding: afl-llvm-pass.so (deflated 68%) Step #6: adding: afl-llvm-rt-lto-32.o (deflated 21%) Step #6: adding: afl-llvm-rt-lto-64.o (deflated 20%) Step #6: adding: afl-llvm-rt-lto.o (deflated 20%) Step #6: adding: afl-lto (deflated 57%) Step #6: adding: afl-lto++ (deflated 57%) Step #6: adding: afl-lto++.8 (deflated 56%) Step #6: adding: afl-lto.8 (deflated 56%) Step #6: adding: afl-persistent-config (deflated 60%) Step #6: adding: afl-plot (deflated 65%) Step #6: adding: afl-showmap (deflated 55%) Step #6: adding: afl-system-config (deflated 63%) Step #6: adding: afl-tmin (deflated 54%) Step #6: adding: afl-whatsup (deflated 69%) Step #6: adding: afl-wine-trace (deflated 70%) Step #6: adding: afl_options.txt (deflated 20%) Step #6: adding: cmplog-instructions-pass.so (deflated 69%) Step #6: adding: cmplog-routines-pass.so (deflated 70%) Step #6: adding: cmplog-switches-pass.so (deflated 69%) Step #6: adding: compare-transform-pass.so (deflated 69%) Step #6: adding: dynamic_list.txt (deflated 76%) Step #6: adding: fuzz_atpointer (deflated 66%) Step #6: adding: fuzz_atpointer.zip (stored 0%) Step #6: adding: fuzz_dump (deflated 66%) Step #6: adding: fuzz_dump.zip (stored 0%) Step #6: adding: fuzz_dump_raw_tape (deflated 66%) Step #6: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #6: adding: fuzz_element (deflated 66%) Step #6: adding: fuzz_element.zip (stored 0%) Step #6: adding: fuzz_implementations (deflated 66%) Step #6: adding: fuzz_implementations.zip (stored 0%) Step #6: adding: fuzz_minify (deflated 66%) Step #6: adding: fuzz_minify.zip (stored 0%) Step #6: adding: fuzz_minifyimpl (deflated 66%) Step #6: adding: fuzz_minifyimpl.zip (stored 0%) Step #6: adding: fuzz_ndjson (deflated 66%) Step #6: adding: fuzz_ndjson.zip (stored 0%) Step #6: adding: fuzz_ondemand (deflated 66%) Step #6: adding: fuzz_ondemand.zip (stored 0%) Step #6: adding: fuzz_padded (deflated 67%) Step #6: adding: fuzz_padded.zip (stored 0%) Step #6: adding: fuzz_parser (deflated 66%) Step #6: adding: fuzz_parser.zip (stored 0%) Step #6: adding: fuzz_print_json (deflated 66%) Step #6: adding: fuzz_print_json.zip (stored 0%) Step #6: adding: fuzz_utf8 (deflated 66%) Step #6: adding: fuzz_utf8.zip (stored 0%) Step #6: adding: libAFLDriver.a (deflated 64%) Step #6: adding: libAFLQemuDriver.a (deflated 64%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: split-compares-pass.so (deflated 68%) Step #6: adding: split-switches-pass.so (deflated 69%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 869 --:--:-- --:--:-- --:--:-- 867 100 157 0 0 100 157 0 868 --:--:-- --:--:-- --:--:-- 867 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32.4M 0 0 100 32.4M 0 85.9M --:--:-- --:--:-- --:--:-- 86.1M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 765 --:--:-- --:--:-- --:--:-- 767 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 148 --:--:-- --:--:-- --:--:-- 149 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #11 Starting Step #12 - "compile-honggfuzz-address-x86_64" Step #12 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #12 - "compile-honggfuzz-address-x86_64": done. Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": CC=clang Step #12 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #12 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #12 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #12 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #12 - "compile-honggfuzz-address-x86_64": + fuzz/ossfuzz.sh Step #12 - "compile-honggfuzz-address-x86_64": + which zip Step #12 - "compile-honggfuzz-address-x86_64": + which cmake Step #12 - "compile-honggfuzz-address-x86_64": + which ninja Step #12 - "compile-honggfuzz-address-x86_64": + fuzz/build_corpus.sh Step #12 - "compile-honggfuzz-address-x86_64": + mkdir -p build Step #12 - "compile-honggfuzz-address-x86_64": + cd build Step #12 - "compile-honggfuzz-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #12 - "compile-honggfuzz-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #12 - "compile-honggfuzz-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info - done Step #12 - "compile-honggfuzz-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features - done Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info - done Step #12 - "compile-honggfuzz-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features Step #12 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features - done Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for fork Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for fork - found Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for wait Step #12 - "compile-honggfuzz-address-x86_64": -- Looking for wait - found Step #12 - "compile-honggfuzz-address-x86_64": -- Adding -Og to compile flag Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #12 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #12 - "compile-honggfuzz-address-x86_64": -- Found Threads: TRUE Step #12 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #12 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package cxxopts@ () Step #12 - "compile-honggfuzz-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #12 - "compile-honggfuzz-address-x86_64": -- Found Python3: /usr/local/bin/python3.8 (found version "3.8.3") found components: Interpreter Step #12 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo test. Step #12 - "compile-honggfuzz-address-x86_64": -- Including simdjson-singleheader test. Step #12 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #12 - "compile-honggfuzz-address-x86_64": -- We disable the checkperf targets under Ninja. Step #12 - "compile-honggfuzz-address-x86_64": -- Configuring done (4.4s) Step #12 - "compile-honggfuzz-address-x86_64": -- Generating done (0.1s) Step #12 - "compile-honggfuzz-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #12 - "compile-honggfuzz-address-x86_64": + cmake --build . --target all_fuzzers Step #12 - "compile-honggfuzz-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_minify [17/28] Linking CXX executable fuzz/fuzz_atpointer [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_parser [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_dump [22/28] Linking CXX executable fuzz/fuzz_padded [23/28] Linking CXX executable fuzz/fuzz_print_json [24/28] Linking CXX executable fuzz/fuzz_minifyimpl [25/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [26/28] Linking CXX executable fuzz/fuzz_element [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_utf8 Step #12 - "compile-honggfuzz-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/honggfuzz-address-x86_64 Step #12 - "compile-honggfuzz-address-x86_64": + ls /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer /workspace/out/honggfuzz-address-x86_64/fuzz_dump /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape /workspace/out/honggfuzz-address-x86_64/fuzz_element /workspace/out/honggfuzz-address-x86_64/fuzz_implementations /workspace/out/honggfuzz-address-x86_64/fuzz_minify /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand /workspace/out/honggfuzz-address-x86_64/fuzz_padded /workspace/out/honggfuzz-address-x86_64/fuzz_parser /workspace/out/honggfuzz-address-x86_64/fuzz_print_json /workspace/out/honggfuzz-address-x86_64/fuzz_utf8+ Step #12 - "compile-honggfuzz-address-x86_64": grep -v .zip$ Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_element Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_element.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_implementations Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_implementations.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minify Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minify.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_padded Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_padded.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_parser Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_parser.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_print_json Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_print_json.zip Step #12 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_utf8 Step #12 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_utf8.zip Finished Step #12 - "compile-honggfuzz-address-x86_64" Starting Step #13 - "build-check-honggfuzz-address-x86_64" Step #13 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_print_json Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_atpointer Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_minifyimpl Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_padded Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_dump Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_dump_raw_tape Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_minify Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_ondemand Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_element Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_ndjson Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_parser Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_implementations Step #13 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpejyn8uwd/fuzz_utf8 Finished Step #13 - "build-check-honggfuzz-address-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/simdjson Step #15: adding: fuzz_atpointer (deflated 67%) Step #15: adding: fuzz_atpointer.zip (stored 0%) Step #15: adding: fuzz_dump (deflated 67%) Step #15: adding: fuzz_dump.zip (stored 0%) Step #15: adding: fuzz_dump_raw_tape (deflated 67%) Step #15: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #15: adding: fuzz_element (deflated 67%) Step #15: adding: fuzz_element.zip (stored 0%) Step #15: adding: fuzz_implementations (deflated 67%) Step #15: adding: fuzz_implementations.zip (stored 0%) Step #15: adding: fuzz_minify (deflated 67%) Step #15: adding: fuzz_minify.zip (stored 0%) Step #15: adding: fuzz_minifyimpl (deflated 67%) Step #15: adding: fuzz_minifyimpl.zip (stored 0%) Step #15: adding: fuzz_ndjson (deflated 67%) Step #15: adding: fuzz_ndjson.zip (stored 0%) Step #15: adding: fuzz_ondemand (deflated 67%) Step #15: adding: fuzz_ondemand.zip (stored 0%) Step #15: adding: fuzz_padded (deflated 67%) Step #15: adding: fuzz_padded.zip (stored 0%) Step #15: adding: fuzz_parser (deflated 67%) Step #15: adding: fuzz_parser.zip (stored 0%) Step #15: adding: fuzz_print_json (deflated 67%) Step #15: adding: fuzz_print_json.zip (stored 0%) Step #15: adding: fuzz_utf8 (deflated 67%) Step #15: adding: fuzz_utf8.zip (stored 0%) Step #15: adding: honggfuzz (deflated 66%) Step #15: adding: llvm-symbolizer (deflated 66%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 734 --:--:-- --:--:-- --:--:-- 737 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 26.0M 0 0 100 26.0M 0 81.9M --:--:-- --:--:-- --:--:-- 82.0M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 564 --:--:-- --:--:-- --:--:-- 565 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 135 --:--:-- --:--:-- --:--:-- 135 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #20 Starting Step #21 - "compile-libfuzzer-address-x86_64" Step #21 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #21 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": CC=clang Step #21 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #21 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #21 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #21 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #21 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #21 - "compile-libfuzzer-address-x86_64": + fuzz/ossfuzz.sh Step #21 - "compile-libfuzzer-address-x86_64": + which zip Step #21 - "compile-libfuzzer-address-x86_64": + which cmake Step #21 - "compile-libfuzzer-address-x86_64": + which ninja Step #21 - "compile-libfuzzer-address-x86_64": + fuzz/build_corpus.sh Step #21 - "compile-libfuzzer-address-x86_64": + mkdir -p build Step #21 - "compile-libfuzzer-address-x86_64": + cd build Step #21 - "compile-libfuzzer-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #21 - "compile-libfuzzer-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #21 - "compile-libfuzzer-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info - done Step #21 - "compile-libfuzzer-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features - done Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info - done Step #21 - "compile-libfuzzer-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features Step #21 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features - done Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for fork Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for fork - found Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for wait Step #21 - "compile-libfuzzer-address-x86_64": -- Looking for wait - found Step #21 - "compile-libfuzzer-address-x86_64": -- Adding -Og to compile flag Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #21 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #21 - "compile-libfuzzer-address-x86_64": -- Found Threads: TRUE Step #21 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #21 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package cxxopts@ () Step #21 - "compile-libfuzzer-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #21 - "compile-libfuzzer-address-x86_64": -- Found Python3: /usr/local/bin/python3.8 (found version "3.8.3") found components: Interpreter Step #21 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo test. Step #21 - "compile-libfuzzer-address-x86_64": -- Including simdjson-singleheader test. Step #21 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #21 - "compile-libfuzzer-address-x86_64": -- We disable the checkperf targets under Ninja. Step #21 - "compile-libfuzzer-address-x86_64": -- Configuring done (4.4s) Step #21 - "compile-libfuzzer-address-x86_64": -- Generating done (0.1s) Step #21 - "compile-libfuzzer-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #21 - "compile-libfuzzer-address-x86_64": + cmake --build . --target all_fuzzers Step #21 - "compile-libfuzzer-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_ndjson [20/28] Linking CXX executable fuzz/fuzz_ondemand [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_element [23/28] Linking CXX executable fuzz/fuzz_implementations [24/28] Linking CXX executable fuzz/fuzz_dump [25/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [26/28] Linking CXX executable fuzz/fuzz_print_json [27/28] Linking CXX executable fuzz/fuzz_utf8 [28/28] Linking CXX executable fuzz/fuzz_minifyimpl Step #21 - "compile-libfuzzer-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-address-x86_64 Step #21 - "compile-libfuzzer-address-x86_64": + + ls /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer /workspace/out/libfuzzer-address-x86_64/fuzz_dump /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-address-x86_64/fuzz_element /workspace/out/libfuzzer-address-x86_64/fuzz_implementations /workspace/out/libfuzzer-address-x86_64/fuzz_minify /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson /workspace/out/libfuzzer-address-x86_64/fuzz_ondemandgrep /workspace/out/libfuzzer-address-x86_64/fuzz_padded -v /workspace/out/libfuzzer-address-x86_64/fuzz_parser .zip$ /workspace/out/libfuzzer-address-x86_64/fuzz_print_json Step #21 - "compile-libfuzzer-address-x86_64": /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_element Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_element.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_implementations Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_implementations.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minify Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minify.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_padded Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_padded.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_parser Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_parser.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_print_json Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_print_json.zip Step #21 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #21 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_utf8.zip Finished Step #21 - "compile-libfuzzer-address-x86_64" Starting Step #22 - "build-check-libfuzzer-address-x86_64" Step #22 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_print_json Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_atpointer Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_minifyimpl Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_padded Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_dump Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_dump_raw_tape Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_minify Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_ondemand Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_element Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_ndjson Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_parser Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_implementations Step #22 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmppy6ens4u/fuzz_utf8 Finished Step #22 - "build-check-libfuzzer-address-x86_64" Starting Step #23 Step #23: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #23 Starting Step #24 Step #24: Already have image: gcr.io/oss-fuzz/simdjson Step #24: adding: fuzz_atpointer (deflated 67%) Step #24: adding: fuzz_atpointer.zip (stored 0%) Step #24: adding: fuzz_dump (deflated 67%) Step #24: adding: fuzz_dump.zip (stored 0%) Step #24: adding: fuzz_dump_raw_tape (deflated 67%) Step #24: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #24: adding: fuzz_element (deflated 67%) Step #24: adding: fuzz_element.zip (stored 0%) Step #24: adding: fuzz_implementations (deflated 67%) Step #24: adding: fuzz_implementations.zip (stored 0%) Step #24: adding: fuzz_minify (deflated 67%) Step #24: adding: fuzz_minify.zip (stored 0%) Step #24: adding: fuzz_minifyimpl (deflated 67%) Step #24: adding: fuzz_minifyimpl.zip (stored 0%) Step #24: adding: fuzz_ndjson (deflated 67%) Step #24: adding: fuzz_ndjson.zip (stored 0%) Step #24: adding: fuzz_ondemand (deflated 67%) Step #24: adding: fuzz_ondemand.zip (stored 0%) Step #24: adding: fuzz_padded (deflated 67%) Step #24: adding: fuzz_padded.zip (stored 0%) Step #24: adding: fuzz_parser (deflated 67%) Step #24: adding: fuzz_parser.zip (stored 0%) Step #24: adding: fuzz_print_json (deflated 67%) Step #24: adding: fuzz_print_json.zip (stored 0%) Step #24: adding: fuzz_utf8 (deflated 67%) Step #24: adding: fuzz_utf8.zip (stored 0%) Step #24: adding: llvm-symbolizer (deflated 66%) Finished Step #24 Starting Step #25 Step #25: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #25: % Total % Received % Xferd Average Speed Time Time Time Current Step #25: Dload Upload Total Spent Left Speed Step #25: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 840 --:--:-- --:--:-- --:--:-- 844 Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 34.2M 0 0 100 34.2M 0 75.8M --:--:-- --:--:-- --:--:-- 75.8M Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 711 --:--:-- --:--:-- --:--:-- 713 Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/cloud-builders/curl Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 154 --:--:-- --:--:-- --:--:-- 154 Finished Step #28 Starting Step #29 Step #29: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #29 Starting Step #30 - "compile-libfuzzer-memory-x86_64" Step #30 - "compile-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #30 - "compile-libfuzzer-memory-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #30 - "compile-libfuzzer-memory-x86_64": Building without MSan instrumented libraries. Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": CC=clang Step #30 - "compile-libfuzzer-memory-x86_64": CXX=clang++ Step #30 - "compile-libfuzzer-memory-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link Step #30 - "compile-libfuzzer-memory-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ Step #30 - "compile-libfuzzer-memory-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=memory -Cdebuginfo=1 -Cforce-frame-pointers Step #30 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #30 - "compile-libfuzzer-memory-x86_64": + fuzz/ossfuzz.sh Step #30 - "compile-libfuzzer-memory-x86_64": + which zip Step #30 - "compile-libfuzzer-memory-x86_64": + which cmake Step #30 - "compile-libfuzzer-memory-x86_64": + which ninja Step #30 - "compile-libfuzzer-memory-x86_64": + fuzz/build_corpus.sh Step #30 - "compile-libfuzzer-memory-x86_64": + mkdir -p build Step #30 - "compile-libfuzzer-memory-x86_64": + cd build Step #30 - "compile-libfuzzer-memory-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #30 - "compile-libfuzzer-memory-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #30 - "compile-libfuzzer-memory-x86_64": -- The C compiler identification is Clang 18.1.8 Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features Step #30 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features - done Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for fork Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for fork - found Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for wait Step #30 - "compile-libfuzzer-memory-x86_64": -- Looking for wait - found Step #30 - "compile-libfuzzer-memory-x86_64": -- Adding -Og to compile flag Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #30 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #30 - "compile-libfuzzer-memory-x86_64": -- Found Threads: TRUE Step #30 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package simdjson-data@ () Step #30 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package cxxopts@ () Step #30 - "compile-libfuzzer-memory-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #30 - "compile-libfuzzer-memory-x86_64": -- Found Python3: /usr/local/bin/python3.8 (found version "3.8.3") found components: Interpreter Step #30 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo test. Step #30 - "compile-libfuzzer-memory-x86_64": -- Including simdjson-singleheader test. Step #30 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #30 - "compile-libfuzzer-memory-x86_64": -- We disable the checkperf targets under Ninja. Step #30 - "compile-libfuzzer-memory-x86_64": -- Configuring done (4.1s) Step #30 - "compile-libfuzzer-memory-x86_64": -- Generating done (0.1s) Step #30 - "compile-libfuzzer-memory-x86_64": -- Build files have been written to: /src/simdjson/build Step #30 - "compile-libfuzzer-memory-x86_64": + cmake --build . --target all_fuzzers Step #30 - "compile-libfuzzer-memory-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_ondemand [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [23/28] Linking CXX executable fuzz/fuzz_element [24/28] Linking CXX executable fuzz/fuzz_utf8 [25/28] Linking CXX executable fuzz/fuzz_implementations [26/28] Linking CXX executable fuzz/fuzz_dump [27/28] Linking CXX executable fuzz/fuzz_print_json [28/28] Linking CXX executable fuzz/fuzz_minifyimpl Step #30 - "compile-libfuzzer-memory-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-memory-x86_64 Step #30 - "compile-libfuzzer-memory-x86_64": + + ls /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointergrep /workspace/out/libfuzzer-memory-x86_64/fuzz_dump -v /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape .zip$ /workspace/out/libfuzzer-memory-x86_64/fuzz_element Step #30 - "compile-libfuzzer-memory-x86_64": /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations /workspace/out/libfuzzer-memory-x86_64/fuzz_minify /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand /workspace/out/libfuzzer-memory-x86_64/fuzz_padded /workspace/out/libfuzzer-memory-x86_64/fuzz_parser /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_element Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_element.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minify Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minify.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_padded Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_padded.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_parser Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_parser.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json.zip Step #30 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #30 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8.zip Finished Step #30 - "compile-libfuzzer-memory-x86_64" Starting Step #31 - "build-check-libfuzzer-memory-x86_64" Step #31 - "build-check-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_print_json Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_atpointer Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_minifyimpl Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_padded Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_dump Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_dump_raw_tape Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_minify Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_ondemand Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_element Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_ndjson Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_parser Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_implementations Step #31 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3655hx9t/fuzz_utf8 Finished Step #31 - "build-check-libfuzzer-memory-x86_64" Starting Step #32 Step #32: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #32 Starting Step #33 Step #33: Already have image: gcr.io/oss-fuzz/simdjson Step #33: adding: fuzz_atpointer (deflated 66%) Step #33: adding: fuzz_atpointer.zip (stored 0%) Step #33: adding: fuzz_dump (deflated 66%) Step #33: adding: fuzz_dump.zip (stored 0%) Step #33: adding: fuzz_dump_raw_tape (deflated 66%) Step #33: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #33: adding: fuzz_element (deflated 66%) Step #33: adding: fuzz_element.zip (stored 0%) Step #33: adding: fuzz_implementations (deflated 66%) Step #33: adding: fuzz_implementations.zip (stored 0%) Step #33: adding: fuzz_minify (deflated 66%) Step #33: adding: fuzz_minify.zip (stored 0%) Step #33: adding: fuzz_minifyimpl (deflated 66%) Step #33: adding: fuzz_minifyimpl.zip (stored 0%) Step #33: adding: fuzz_ndjson (deflated 66%) Step #33: adding: fuzz_ndjson.zip (stored 0%) Step #33: adding: fuzz_ondemand (deflated 66%) Step #33: adding: fuzz_ondemand.zip (stored 0%) Step #33: adding: fuzz_padded (deflated 66%) Step #33: adding: fuzz_padded.zip (stored 0%) Step #33: adding: fuzz_parser (deflated 66%) Step #33: adding: fuzz_parser.zip (stored 0%) Step #33: adding: fuzz_print_json (deflated 66%) Step #33: adding: fuzz_print_json.zip (stored 0%) Step #33: adding: fuzz_utf8 (deflated 66%) Step #33: adding: fuzz_utf8.zip (stored 0%) Step #33: adding: llvm-symbolizer (deflated 66%) Finished Step #33 Starting Step #34 Step #34: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #34: % Total % Received % Xferd Average Speed Time Time Time Current Step #34: Dload Upload Total Spent Left Speed Step #34: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 855 --:--:-- --:--:-- --:--:-- 857 Finished Step #34 Starting Step #35 Step #35: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #35: % Total % Received % Xferd Average Speed Time Time Time Current Step #35: Dload Upload Total Spent Left Speed Step #35: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 41.6M 0 0 100 41.6M 0 67.7M --:--:-- --:--:-- --:--:-- 67.7M Finished Step #35 Starting Step #36 Step #36: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #36: % Total % Received % Xferd Average Speed Time Time Time Current Step #36: Dload Upload Total Spent Left Speed Step #36: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 771 --:--:-- --:--:-- --:--:-- 774 Finished Step #36 Starting Step #37 Step #37: Already have image (with digest): gcr.io/cloud-builders/curl Step #37: % Total % Received % Xferd Average Speed Time Time Time Current Step #37: Dload Upload Total Spent Left Speed Step #37: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 162 --:--:-- --:--:-- --:--:-- 161 100 32 0 0 100 32 0 162 --:--:-- --:--:-- --:--:-- 161 Finished Step #37 Starting Step #38 Step #38: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #38 Starting Step #39 - "compile-libfuzzer-undefined-x86_64" Step #39 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #39 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #39 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #39 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function Step #39 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ Step #39 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #39 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #39 - "compile-libfuzzer-undefined-x86_64": + fuzz/ossfuzz.sh Step #39 - "compile-libfuzzer-undefined-x86_64": + which zip Step #39 - "compile-libfuzzer-undefined-x86_64": + which cmake Step #39 - "compile-libfuzzer-undefined-x86_64": + which ninja Step #39 - "compile-libfuzzer-undefined-x86_64": + fuzz/build_corpus.sh Step #39 - "compile-libfuzzer-undefined-x86_64": + mkdir -p build Step #39 - "compile-libfuzzer-undefined-x86_64": + cd build Step #39 - "compile-libfuzzer-undefined-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #39 - "compile-libfuzzer-undefined-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #39 - "compile-libfuzzer-undefined-x86_64": -- The C compiler identification is Clang 18.1.8 Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features Step #39 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features - done Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork - found Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait Step #39 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait - found Step #39 - "compile-libfuzzer-undefined-x86_64": -- Adding -Og to compile flag Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #39 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #39 - "compile-libfuzzer-undefined-x86_64": -- Found Threads: TRUE Step #39 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package simdjson-data@ () Step #39 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package cxxopts@ () Step #39 - "compile-libfuzzer-undefined-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #39 - "compile-libfuzzer-undefined-x86_64": -- Found Python3: /usr/local/bin/python3.8 (found version "3.8.3") found components: Interpreter Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including simdjson-singleheader test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #39 - "compile-libfuzzer-undefined-x86_64": -- We disable the checkperf targets under Ninja. Step #39 - "compile-libfuzzer-undefined-x86_64": -- Configuring done (3.0s) Step #39 - "compile-libfuzzer-undefined-x86_64": -- Generating done (0.1s) Step #39 - "compile-libfuzzer-undefined-x86_64": -- Build files have been written to: /src/simdjson/build Step #39 - "compile-libfuzzer-undefined-x86_64": + cmake --build . --target all_fuzzers Step #39 - "compile-libfuzzer-undefined-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_ndjson [20/28] Linking CXX executable fuzz/fuzz_ondemand [21/28] Linking CXX executable fuzz/fuzz_dump [22/28] Linking CXX executable fuzz/fuzz_padded [23/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [24/28] Linking CXX executable fuzz/fuzz_minifyimpl [25/28] Linking CXX executable fuzz/fuzz_utf8 [26/28] Linking CXX executable fuzz/fuzz_print_json [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_element Step #39 - "compile-libfuzzer-undefined-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-undefined-x86_64 Step #39 - "compile-libfuzzer-undefined-x86_64": + ls /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-undefined-x86_64/fuzz_element /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded+ /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #39 - "compile-libfuzzer-undefined-x86_64": grep -v .zip$ Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_element Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_element.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json.zip Step #39 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #39 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8.zip Finished Step #39 - "compile-libfuzzer-undefined-x86_64" Starting Step #40 - "build-check-libfuzzer-undefined-x86_64" Step #40 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_print_json Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_atpointer Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_minifyimpl Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_padded Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_dump Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_dump_raw_tape Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_minify Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_ondemand Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_element Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_ndjson Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_parser Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_implementations Step #40 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp02ng_81j/fuzz_utf8 Finished Step #40 - "build-check-libfuzzer-undefined-x86_64" Starting Step #41 Step #41: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #41 Starting Step #42 Step #42: Already have image: gcr.io/oss-fuzz/simdjson Step #42: adding: fuzz_atpointer (deflated 67%) Step #42: adding: fuzz_atpointer.zip (stored 0%) Step #42: adding: fuzz_dump (deflated 68%) Step #42: adding: fuzz_dump.zip (stored 0%) Step #42: adding: fuzz_dump_raw_tape (deflated 68%) Step #42: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #42: adding: fuzz_element (deflated 68%) Step #42: adding: fuzz_element.zip (stored 0%) Step #42: adding: fuzz_implementations (deflated 68%) Step #42: adding: fuzz_implementations.zip (stored 0%) Step #42: adding: fuzz_minify (deflated 67%) Step #42: adding: fuzz_minify.zip (stored 0%) Step #42: adding: fuzz_minifyimpl (deflated 68%) Step #42: adding: fuzz_minifyimpl.zip (stored 0%) Step #42: adding: fuzz_ndjson (deflated 67%) Step #42: adding: fuzz_ndjson.zip (stored 0%) Step #42: adding: fuzz_ondemand (deflated 67%) Step #42: adding: fuzz_ondemand.zip (stored 0%) Step #42: adding: fuzz_padded (deflated 67%) Step #42: adding: fuzz_padded.zip (stored 0%) Step #42: adding: fuzz_parser (deflated 67%) Step #42: adding: fuzz_parser.zip (stored 0%) Step #42: adding: fuzz_print_json (deflated 68%) Step #42: adding: fuzz_print_json.zip (stored 0%) Step #42: adding: fuzz_utf8 (deflated 68%) Step #42: adding: fuzz_utf8.zip (stored 0%) Step #42: adding: llvm-symbolizer (deflated 66%) Finished Step #42 Starting Step #43 Step #43: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #43: % Total % Received % Xferd Average Speed Time Time Time Current Step #43: Dload Upload Total Spent Left Speed Step #43: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 876 --:--:-- --:--:-- --:--:-- 882 Finished Step #43 Starting Step #44 Step #44: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #44: % Total % Received % Xferd Average Speed Time Time Time Current Step #44: Dload Upload Total Spent Left Speed Step #44: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 54 25.7M 0 0 54 14.0M 0 122M --:--:-- --:--:-- --:--:-- 121M 100 25.7M 0 0 100 25.7M 0 84.4M --:--:-- --:--:-- --:--:-- 84.4M Finished Step #44 Starting Step #45 Step #45: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #45: % Total % Received % Xferd Average Speed Time Time Time Current Step #45: Dload Upload Total Spent Left Speed Step #45: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 782 --:--:-- --:--:-- --:--:-- 784 Finished Step #45 Starting Step #46 Step #46: Already have image (with digest): gcr.io/cloud-builders/curl Step #46: % Total % Received % Xferd Average Speed Time Time Time Current Step #46: Dload Upload Total Spent Left Speed Step #46: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 145 --:--:-- --:--:-- --:--:-- 145 Finished Step #46 Starting Step #47 Step #47: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #47 PUSH DONE