starting build "b0876048-945e-4f22-9483-7cff307d1acb" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc" Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Sending build context to Docker daemon 5.12kB Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": latest: Pulling from oss-fuzz-base/base-builder Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b549f31133a9: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cde73eda1675: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ab8fa1a1224: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 595ac4db79ee: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d6662a434482: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c1e8508a506: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 760d0b3e5670: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d5f98576c68f: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cfb40a3ef9da: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f39fec9b1d6d: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3d463233cf5c: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4a996b1c8221: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ab1308ee9b34: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3921b178a88d: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 69ef84a4446a: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3466e0438979: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 595ac4db79ee: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b17b3182a508: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d6662a434482: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 92c9e8d5d963: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4581be439ec0: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c1e8508a506: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f39fec9b1d6d: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 760d0b3e5670: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 068b0d7c9b3a: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0526c0380ea5: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4ff4477285dd: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6ea302d03e86: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3d463233cf5c: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f2b48ea4d117: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d5f98576c68f: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4a996b1c8221: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cfb40a3ef9da: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4f18d9dc5678: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6031f97bbed0: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cebd9caa4245: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ab1308ee9b34: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 7180a5420452: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3921b178a88d: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ec87d61cfb8: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 69ef84a4446a: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3466e0438979: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c8ebaa3b337: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 276751a5373a: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b17b3182a508: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ff5cabec616c: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 94d4a3a0f393: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8ac244d4ef00: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ba30b798bc71: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 57ddf6d3a128: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6bc69ad35e5b: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": c835ec7b4a6e: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 666de0e26624: Pulling fs layer Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 92c9e8d5d963: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4581be439ec0: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 068b0d7c9b3a: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0526c0380ea5: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4ff4477285dd: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6ea302d03e86: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 276751a5373a: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ff5cabec616c: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 94d4a3a0f393: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8ac244d4ef00: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f2b48ea4d117: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ba30b798bc71: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6031f97bbed0: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 57ddf6d3a128: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c8ebaa3b337: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cebd9caa4245: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4f18d9dc5678: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6bc69ad35e5b: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 7180a5420452: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ec87d61cfb8: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 666de0e26624: Waiting Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ab8fa1a1224: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ab8fa1a1224: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b549f31133a9: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b549f31133a9: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d6662a434482: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d6662a434482: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 595ac4db79ee: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 595ac4db79ee: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c1e8508a506: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d5f98576c68f: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cde73eda1675: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cde73eda1675: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cfb40a3ef9da: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b549f31133a9: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3d463233cf5c: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3d463233cf5c: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4a996b1c8221: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4a996b1c8221: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ab1308ee9b34: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ab1308ee9b34: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3921b178a88d: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3921b178a88d: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 69ef84a4446a: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3466e0438979: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3466e0438979: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f39fec9b1d6d: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f39fec9b1d6d: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 92c9e8d5d963: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 92c9e8d5d963: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b17b3182a508: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b17b3182a508: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4581be439ec0: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4581be439ec0: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 068b0d7c9b3a: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 068b0d7c9b3a: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0526c0380ea5: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0526c0380ea5: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4ff4477285dd: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6ea302d03e86: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6ea302d03e86: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f2b48ea4d117: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f2b48ea4d117: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4f18d9dc5678: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4f18d9dc5678: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6031f97bbed0: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 760d0b3e5670: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 760d0b3e5670: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cebd9caa4245: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 7180a5420452: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 7180a5420452: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ec87d61cfb8: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ec87d61cfb8: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 276751a5373a: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 276751a5373a: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c8ebaa3b337: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c8ebaa3b337: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ff5cabec616c: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ff5cabec616c: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 94d4a3a0f393: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 94d4a3a0f393: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8ac244d4ef00: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8ac244d4ef00: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ba30b798bc71: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ba30b798bc71: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": c835ec7b4a6e: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": c835ec7b4a6e: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cde73eda1675: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 57ddf6d3a128: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 57ddf6d3a128: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 666de0e26624: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ab8fa1a1224: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6bc69ad35e5b: Verifying Checksum Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6bc69ad35e5b: Download complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 595ac4db79ee: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d6662a434482: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c1e8508a506: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 760d0b3e5670: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": d5f98576c68f: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cfb40a3ef9da: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f39fec9b1d6d: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3d463233cf5c: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4a996b1c8221: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ab1308ee9b34: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3921b178a88d: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 69ef84a4446a: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 3466e0438979: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": b17b3182a508: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 92c9e8d5d963: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4581be439ec0: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 068b0d7c9b3a: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0526c0380ea5: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4ff4477285dd: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6ea302d03e86: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": f2b48ea4d117: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 4f18d9dc5678: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6031f97bbed0: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": cebd9caa4245: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 7180a5420452: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 9ec87d61cfb8: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8c8ebaa3b337: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 276751a5373a: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ff5cabec616c: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 94d4a3a0f393: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 8ac244d4ef00: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ba30b798bc71: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 57ddf6d3a128: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 6bc69ad35e5b: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": c835ec7b4a6e: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 666de0e26624: Pull complete Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Digest: sha256:61dfe9b9aa5574ae1b64265fc71e73fb0b8fb5341e7d0d8296d4253ab428c10b Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> 293ca1e20d12 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Step 2/5 : RUN apt-get update && apt-get install -y ninja-build wget Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> Running in aeff054e40fd Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Fetched 128 kB in 1s (230 kB/s) Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Reading package lists... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Reading package lists... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Building dependency tree... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Reading state information... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": wget is already the newest version (1.20.3-1ubuntu2.1). Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Suggested packages: Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": python3 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": The following NEW packages will be installed: Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ninja-build Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": 0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Need to get 107 kB of archives. Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": After this operation, 338 kB of additional disk space will be used. Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Get:1 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB] Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Fetched 107 kB in 0s (378 kB/s) Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Selecting previously unselected package ninja-build. Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17397 files and directories currently installed.) Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Preparing to unpack .../ninja-build_1.10.0-1build1_amd64.deb ... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Unpacking ninja-build (1.10.0-1build1) ... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Setting up ninja-build (1.10.0-1build1) ... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Removing intermediate container aeff054e40fd Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> 6a8a08e48738 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Step 3/5 : RUN git clone --depth 1 https://github.com/simdjson/simdjson.git simdjson Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> Running in 8603520707c3 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Cloning into 'simdjson'... Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Removing intermediate container 8603520707c3 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> b30946f32fb2 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Step 4/5 : WORKDIR simdjson Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> Running in b7896ad4f636 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Removing intermediate container b7896ad4f636 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> 408b40e1bbf6 Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Step 5/5 : COPY build.sh $SRC/ Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": ---> 4a48f47c9b0c Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Successfully built 4a48f47c9b0c Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Successfully tagged gcr.io/oss-fuzz/simdjson:latest Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/simdjson:latest Finished Step #1 - "build-6e01f008-18c8-4895-8af2-bcd07968c5dc" Starting Step #3 - "push-image" Starting Step #2 - "srcmap" Step #3 - "push-image": Already have image (with digest): gcr.io/cloud-builders/docker Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/simdjson Step #3 - "push-image": Using default tag: latest Step #3 - "push-image": The push refers to repository [us-central1-docker.pkg.dev/oss-fuzz/unsafe/simdjson] Step #3 - "push-image": 8585d1fc7f6b: Preparing Step #3 - "push-image": bfc760debaad: Preparing Step #3 - "push-image": 80c5569c8218: Preparing Step #3 - "push-image": ecb2d85dda6a: Preparing Step #3 - "push-image": 3ccd3cb433de: Preparing Step #3 - "push-image": 143649d062d2: Preparing Step #3 - "push-image": 5d5abb58c96f: Preparing Step #3 - "push-image": 08f3341100d1: Preparing Step #3 - "push-image": 9af681603487: Preparing Step #3 - "push-image": ad8d8e209dab: Preparing Step #3 - "push-image": 897ee090832e: Preparing Step #3 - "push-image": ee12dbebeb91: Preparing Step #3 - "push-image": 3056236b69b9: Preparing Step #3 - "push-image": ea5d906eddfd: Preparing Step #3 - "push-image": ebc9a6cbc86c: Preparing Step #3 - "push-image": f2f4ad975fd0: Preparing Step #3 - "push-image": 2477490ef793: Preparing Step #3 - "push-image": 9b5b17772262: Preparing Step #3 - "push-image": 1952b1a576f2: Preparing Step #3 - "push-image": 30a6dc091336: Preparing Step #3 - "push-image": 070183179dbd: Preparing Step #3 - "push-image": c46bf1ae1502: Preparing Step #3 - "push-image": 4bb71dcfd9bb: Preparing Step #3 - "push-image": 0e7ed94abb87: Preparing Step #3 - "push-image": 143649d062d2: Waiting Step #3 - "push-image": 0e3a2862a34f: Preparing Step #3 - "push-image": 5d5abb58c96f: Waiting Step #3 - "push-image": 127e8e84f469: Preparing Step #3 - "push-image": 08f3341100d1: Waiting Step #3 - "push-image": 42bff69b4fd3: Preparing Step #3 - "push-image": 0531d39e8393: Preparing Step #3 - "push-image": 547e4efe285c: Preparing Step #3 - "push-image": 643355dde8a0: Preparing Step #3 - "push-image": 68f2354002fc: Preparing Step #3 - "push-image": ee12dbebeb91: Waiting Step #3 - "push-image": 0bc7e97eb539: Preparing Step #3 - "push-image": 897ee090832e: Waiting Step #3 - "push-image": db9a80588f58: Preparing Step #3 - "push-image": 9af681603487: Waiting Step #3 - "push-image": 11bba56cbd63: Preparing Step #3 - "push-image": ad8d8e209dab: Waiting Step #3 - "push-image": 5b13f9540e06: Preparing Step #3 - "push-image": 3056236b69b9: Waiting Step #3 - "push-image": 42642dc83095: Preparing Step #3 - "push-image": 9b5b17772262: Waiting Step #3 - "push-image": 3cc16d1bc614: Preparing Step #3 - "push-image": ea5d906eddfd: Waiting Step #3 - "push-image": ecab1fe9f68c: Preparing Step #3 - "push-image": 1952b1a576f2: Waiting Step #3 - "push-image": 2477490ef793: Waiting Step #3 - "push-image": e0578921414e: Preparing Step #3 - "push-image": 4bb71dcfd9bb: Waiting Step #3 - "push-image": 30a6dc091336: Waiting Step #3 - "push-image": 29cd59c3da93: Preparing Step #3 - "push-image": 1f1159b099a8: Preparing Step #3 - "push-image": 0e7ed94abb87: Waiting Step #3 - "push-image": 070183179dbd: Waiting Step #3 - "push-image": d543b8cad89e: Preparing Step #3 - "push-image": ebc9a6cbc86c: Waiting Step #3 - "push-image": f2f4ad975fd0: Waiting Step #3 - "push-image": c46bf1ae1502: Waiting Step #3 - "push-image": 3cc16d1bc614: Waiting Step #3 - "push-image": 0531d39e8393: Waiting Step #3 - "push-image": 127e8e84f469: Waiting Step #3 - "push-image": 42bff69b4fd3: Waiting Step #3 - "push-image": ecab1fe9f68c: Waiting Step #3 - "push-image": 68f2354002fc: Waiting Step #3 - "push-image": 643355dde8a0: Waiting Step #3 - "push-image": e0578921414e: Waiting Step #3 - "push-image": 1f1159b099a8: Waiting Step #3 - "push-image": 11bba56cbd63: Waiting Step #3 - "push-image": db9a80588f58: Waiting Step #3 - "push-image": 0bc7e97eb539: Waiting Step #3 - "push-image": d543b8cad89e: Waiting Step #3 - "push-image": 5b13f9540e06: Waiting Step #3 - "push-image": 42642dc83095: Waiting Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileEq8HGO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/simdjson/.git Step #2 - "srcmap": + GIT_DIR=/src/simdjson Step #2 - "srcmap": + cd /src/simdjson Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/simdjson/simdjson.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f3ac74caf8835d78b1a53ad2ea72e06766f51f0c Step #2 - "srcmap": + jq_inplace /tmp/fileEq8HGO '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "f3ac74caf8835d78b1a53ad2ea72e06766f51f0c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileaa0paa Step #2 - "srcmap": + cat /tmp/fileEq8HGO Step #2 - "srcmap": + jq '."/src/simdjson" = { type: "git", url: "https://github.com/simdjson/simdjson.git", rev: "f3ac74caf8835d78b1a53ad2ea72e06766f51f0c" }' Step #3 - "push-image": ecb2d85dda6a: Layer already exists Step #3 - "push-image": 3ccd3cb433de: Layer already exists Step #2 - "srcmap": + mv /tmp/fileaa0paa /tmp/fileEq8HGO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #3 - "push-image": 143649d062d2: Layer already exists Step #3 - "push-image": 5d5abb58c96f: Layer already exists Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileEq8HGO Step #2 - "srcmap": + rm /tmp/fileEq8HGO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/simdjson": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/simdjson/simdjson.git", Step #2 - "srcmap": "rev": "f3ac74caf8835d78b1a53ad2ea72e06766f51f0c" Step #2 - "srcmap": } Step #2 - "srcmap": } Step #3 - "push-image": 08f3341100d1: Layer already exists Step #3 - "push-image": 9af681603487: Layer already exists Step #3 - "push-image": ad8d8e209dab: Layer already exists Step #3 - "push-image": 897ee090832e: Layer already exists Step #3 - "push-image": 3056236b69b9: Layer already exists Step #3 - "push-image": ee12dbebeb91: Layer already exists Step #3 - "push-image": 8585d1fc7f6b: Pushed Step #3 - "push-image": ea5d906eddfd: Layer already exists Step #3 - "push-image": ebc9a6cbc86c: Layer already exists Step #3 - "push-image": f2f4ad975fd0: Layer already exists Step #3 - "push-image": 9b5b17772262: Layer already exists Step #3 - "push-image": 2477490ef793: Layer already exists Step #3 - "push-image": 80c5569c8218: Pushed Step #3 - "push-image": 1952b1a576f2: Layer already exists Step #3 - "push-image": 30a6dc091336: Layer already exists Step #3 - "push-image": 070183179dbd: Layer already exists Step #3 - "push-image": c46bf1ae1502: Layer already exists Step #3 - "push-image": 4bb71dcfd9bb: Layer already exists Finished Step #2 - "srcmap" Step #3 - "push-image": 0e7ed94abb87: Layer already exists Step #3 - "push-image": 127e8e84f469: Layer already exists Step #3 - "push-image": 0e3a2862a34f: Layer already exists Step #3 - "push-image": 42bff69b4fd3: Layer already exists Step #3 - "push-image": 0531d39e8393: Layer already exists Step #3 - "push-image": 547e4efe285c: Layer already exists Step #3 - "push-image": 643355dde8a0: Layer already exists Step #3 - "push-image": 68f2354002fc: Layer already exists Step #3 - "push-image": 0bc7e97eb539: Layer already exists Step #3 - "push-image": db9a80588f58: Layer already exists Step #3 - "push-image": 11bba56cbd63: Layer already exists Step #3 - "push-image": 5b13f9540e06: Layer already exists Step #3 - "push-image": 42642dc83095: Layer already exists Step #3 - "push-image": ecab1fe9f68c: Layer already exists Step #3 - "push-image": 3cc16d1bc614: Layer already exists Step #3 - "push-image": e0578921414e: Layer already exists Step #3 - "push-image": 29cd59c3da93: Layer already exists Step #3 - "push-image": 1f1159b099a8: Layer already exists Step #3 - "push-image": bfc760debaad: Pushed Step #3 - "push-image": d543b8cad89e: Pushed Step #3 - "push-image": latest: digest: sha256:86c913c0dcb1ee0a7e3d20d40d6ef64cd202359412d7c5594cea7351070c191a size: 9128 Finished Step #3 - "push-image" Starting Step #4 - "compile-afl-address-x86_64" Step #4 - "compile-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #4 - "compile-afl-address-x86_64": vm.mmap_rnd_bits = 28 Step #4 - "compile-afl-address-x86_64": Copying precompiled AFL++ Step #4 - "compile-afl-address-x86_64": Step #4 - "compile-afl-address-x86_64": AFL++ target compilation setup: Step #4 - "compile-afl-address-x86_64": AFL_IGNORE_UNKNOWN_ENVS=1 Step #4 - "compile-afl-address-x86_64": AFL_QUIET=1 Step #4 - "compile-afl-address-x86_64": AFL_IGNORE_PROBLEMS=1 Step #4 - "compile-afl-address-x86_64": Step #4 - "compile-afl-address-x86_64": done. Step #4 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #4 - "compile-afl-address-x86_64": CC=/src/aflplusplus/afl-clang-fast Step #4 - "compile-afl-address-x86_64": CXX=/src/aflplusplus/afl-clang-fast++ Step #4 - "compile-afl-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope Step #4 - "compile-afl-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -stdlib=libc++ Step #4 - "compile-afl-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #4 - "compile-afl-address-x86_64": --------------------------------------------------------------- Step #4 - "compile-afl-address-x86_64": + fuzz/ossfuzz.sh Step #4 - "compile-afl-address-x86_64": + which zip Step #4 - "compile-afl-address-x86_64": + which cmake Step #4 - "compile-afl-address-x86_64": + which ninja Step #4 - "compile-afl-address-x86_64": + fuzz/build_corpus.sh Step #4 - "compile-afl-address-x86_64": + mkdir -p build Step #4 - "compile-afl-address-x86_64": + cd build Step #4 - "compile-afl-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #4 - "compile-afl-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #4 - "compile-afl-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #4 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info Step #4 - "compile-afl-address-x86_64": -- Detecting CXX compiler ABI info - done Step #4 - "compile-afl-address-x86_64": -- Check for working CXX compiler: /src/aflplusplus/afl-clang-fast++ - skipped Step #4 - "compile-afl-address-x86_64": -- Detecting CXX compile features Step #4 - "compile-afl-address-x86_64": -- Detecting CXX compile features - done Step #4 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info Step #4 - "compile-afl-address-x86_64": -- Detecting C compiler ABI info - done Step #4 - "compile-afl-address-x86_64": -- Check for working C compiler: /src/aflplusplus/afl-clang-fast - skipped Step #4 - "compile-afl-address-x86_64": -- Detecting C compile features Step #4 - "compile-afl-address-x86_64": -- Detecting C compile features - done Step #4 - "compile-afl-address-x86_64": -- Looking for fork Step #4 - "compile-afl-address-x86_64": -- Looking for fork - found Step #4 - "compile-afl-address-x86_64": -- Looking for wait Step #4 - "compile-afl-address-x86_64": -- Looking for wait - found Step #4 - "compile-afl-address-x86_64": -- Adding -Og to compile flag Step #4 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #4 - "compile-afl-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #4 - "compile-afl-address-x86_64": -- Found Threads: TRUE Step #4 - "compile-afl-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #4 - "compile-afl-address-x86_64": -- CPM: Adding package cxxopts@ () Step #4 - "compile-afl-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #4 - "compile-afl-address-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found version "3.10.14") found components: Interpreter Step #4 - "compile-afl-address-x86_64": -- Including amalgamate_demo test. Step #4 - "compile-afl-address-x86_64": -- Including simdjson-singleheader test. Step #4 - "compile-afl-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #4 - "compile-afl-address-x86_64": -- We disable the checkperf targets under Ninja. Step #4 - "compile-afl-address-x86_64": -- Configuring done (5.4s) Step #4 - "compile-afl-address-x86_64": -- Generating done (0.1s) Step #4 - "compile-afl-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #4 - "compile-afl-address-x86_64": + cmake --build . --target all_fuzzers Step #4 - "compile-afl-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_ondemand [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_atpointer [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_minifyimpl [23/28] Linking CXX executable fuzz/fuzz_dump [24/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [25/28] Linking CXX executable fuzz/fuzz_element [26/28] Linking CXX executable fuzz/fuzz_utf8 [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_print_json Step #4 - "compile-afl-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/afl-address-x86_64 Step #4 - "compile-afl-address-x86_64": + + ls /workspace/out/afl-address-x86_64/fuzz_atpointer /workspace/out/afl-address-x86_64/fuzz_dumpgrep /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape -v /workspace/out/afl-address-x86_64/fuzz_element .zip$ /workspace/out/afl-address-x86_64/fuzz_implementations Step #4 - "compile-afl-address-x86_64": /workspace/out/afl-address-x86_64/fuzz_minify /workspace/out/afl-address-x86_64/fuzz_minifyimpl /workspace/out/afl-address-x86_64/fuzz_ndjson /workspace/out/afl-address-x86_64/fuzz_ondemand /workspace/out/afl-address-x86_64/fuzz_padded /workspace/out/afl-address-x86_64/fuzz_parser /workspace/out/afl-address-x86_64/fuzz_print_json /workspace/out/afl-address-x86_64/fuzz_utf8 Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_atpointer Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_atpointer.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_dump_raw_tape.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_element Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_element.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_implementations Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_implementations.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minify Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minify.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_minifyimpl Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_minifyimpl.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ndjson Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ndjson.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_ondemand Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_ondemand.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_padded Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_padded.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_parser Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_parser.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_print_json Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_print_json.zip Step #4 - "compile-afl-address-x86_64": + basename /workspace/out/afl-address-x86_64/fuzz_utf8 Step #4 - "compile-afl-address-x86_64": + cp ../corpus.zip /workspace/out/afl-address-x86_64/fuzz_utf8.zip Finished Step #4 - "compile-afl-address-x86_64" Starting Step #5 - "build-check-afl-address-x86_64" Step #5 - "build-check-afl-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #5 - "build-check-afl-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #5 - "build-check-afl-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #5 - "build-check-afl-address-x86_64": b549f31133a9: Already exists Step #5 - "build-check-afl-address-x86_64": cde73eda1675: Already exists Step #5 - "build-check-afl-address-x86_64": 9ab8fa1a1224: Already exists Step #5 - "build-check-afl-address-x86_64": 7fb944c2626b: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 16b8b8e7a735: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 30ac2690114d: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 917802590ade: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 4efce3683cab: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": fe71553d90ec: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": c3cd171d66f5: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": fbf4221b088e: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 1c62bf06aeba: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 0fed6a8e0990: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 0dcc98450cb9: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 602ff4a86beb: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 1e1d839208c0: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": d4af253576e2: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 416b414939dc: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": f5d61c14d73a: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 32c6b9b3a355: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 731ef4034f36: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 922b1ab1d770: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": e99995572309: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 373eaec1aabb: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": a868ce8f89db: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": 785d944e1d0d: Pulling fs layer Step #5 - "build-check-afl-address-x86_64": f5d61c14d73a: Waiting Step #5 - "build-check-afl-address-x86_64": 32c6b9b3a355: Waiting Step #5 - "build-check-afl-address-x86_64": 731ef4034f36: Waiting Step #5 - "build-check-afl-address-x86_64": 416b414939dc: Waiting Step #5 - "build-check-afl-address-x86_64": c3cd171d66f5: Waiting Step #5 - "build-check-afl-address-x86_64": 917802590ade: Waiting Step #5 - "build-check-afl-address-x86_64": 922b1ab1d770: Waiting Step #5 - "build-check-afl-address-x86_64": fbf4221b088e: Waiting Step #5 - "build-check-afl-address-x86_64": 4efce3683cab: Waiting Step #5 - "build-check-afl-address-x86_64": 785d944e1d0d: Waiting Step #5 - "build-check-afl-address-x86_64": 1c62bf06aeba: Waiting Step #5 - "build-check-afl-address-x86_64": e99995572309: Waiting Step #5 - "build-check-afl-address-x86_64": a868ce8f89db: Waiting Step #5 - "build-check-afl-address-x86_64": fe71553d90ec: Waiting Step #5 - "build-check-afl-address-x86_64": 0fed6a8e0990: Waiting Step #5 - "build-check-afl-address-x86_64": 1e1d839208c0: Waiting Step #5 - "build-check-afl-address-x86_64": 602ff4a86beb: Waiting Step #5 - "build-check-afl-address-x86_64": d4af253576e2: Waiting Step #5 - "build-check-afl-address-x86_64": 0dcc98450cb9: Waiting Step #5 - "build-check-afl-address-x86_64": 30ac2690114d: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 30ac2690114d: Download complete Step #5 - "build-check-afl-address-x86_64": 7fb944c2626b: Download complete Step #5 - "build-check-afl-address-x86_64": 16b8b8e7a735: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 16b8b8e7a735: Download complete Step #5 - "build-check-afl-address-x86_64": 4efce3683cab: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 4efce3683cab: Download complete Step #5 - "build-check-afl-address-x86_64": 7fb944c2626b: Pull complete Step #5 - "build-check-afl-address-x86_64": 917802590ade: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 917802590ade: Download complete Step #5 - "build-check-afl-address-x86_64": c3cd171d66f5: Download complete Step #5 - "build-check-afl-address-x86_64": fbf4221b088e: Download complete Step #5 - "build-check-afl-address-x86_64": 1c62bf06aeba: Download complete Step #5 - "build-check-afl-address-x86_64": 16b8b8e7a735: Pull complete Step #5 - "build-check-afl-address-x86_64": fe71553d90ec: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": fe71553d90ec: Download complete Step #5 - "build-check-afl-address-x86_64": 30ac2690114d: Pull complete Step #5 - "build-check-afl-address-x86_64": 0dcc98450cb9: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 0dcc98450cb9: Download complete Step #5 - "build-check-afl-address-x86_64": 602ff4a86beb: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 602ff4a86beb: Download complete Step #5 - "build-check-afl-address-x86_64": 1e1d839208c0: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 1e1d839208c0: Download complete Step #5 - "build-check-afl-address-x86_64": 917802590ade: Pull complete Step #5 - "build-check-afl-address-x86_64": 416b414939dc: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 416b414939dc: Download complete Step #5 - "build-check-afl-address-x86_64": 4efce3683cab: Pull complete Step #5 - "build-check-afl-address-x86_64": 0fed6a8e0990: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 0fed6a8e0990: Download complete Step #5 - "build-check-afl-address-x86_64": d4af253576e2: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": d4af253576e2: Download complete Step #5 - "build-check-afl-address-x86_64": 32c6b9b3a355: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 32c6b9b3a355: Download complete Step #5 - "build-check-afl-address-x86_64": 731ef4034f36: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 731ef4034f36: Download complete Step #5 - "build-check-afl-address-x86_64": 922b1ab1d770: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 922b1ab1d770: Download complete Step #5 - "build-check-afl-address-x86_64": e99995572309: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": e99995572309: Download complete Step #5 - "build-check-afl-address-x86_64": 373eaec1aabb: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": 373eaec1aabb: Download complete Step #5 - "build-check-afl-address-x86_64": a868ce8f89db: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": a868ce8f89db: Download complete Step #5 - "build-check-afl-address-x86_64": 785d944e1d0d: Download complete Step #5 - "build-check-afl-address-x86_64": f5d61c14d73a: Verifying Checksum Step #5 - "build-check-afl-address-x86_64": f5d61c14d73a: Download complete Step #5 - "build-check-afl-address-x86_64": fe71553d90ec: Pull complete Step #5 - "build-check-afl-address-x86_64": c3cd171d66f5: Pull complete Step #5 - "build-check-afl-address-x86_64": fbf4221b088e: Pull complete Step #5 - "build-check-afl-address-x86_64": 1c62bf06aeba: Pull complete Step #5 - "build-check-afl-address-x86_64": 0fed6a8e0990: Pull complete Step #5 - "build-check-afl-address-x86_64": 0dcc98450cb9: Pull complete Step #5 - "build-check-afl-address-x86_64": 602ff4a86beb: Pull complete Step #5 - "build-check-afl-address-x86_64": 1e1d839208c0: Pull complete Step #5 - "build-check-afl-address-x86_64": d4af253576e2: Pull complete Step #5 - "build-check-afl-address-x86_64": 416b414939dc: Pull complete Step #5 - "build-check-afl-address-x86_64": f5d61c14d73a: Pull complete Step #5 - "build-check-afl-address-x86_64": 32c6b9b3a355: Pull complete Step #5 - "build-check-afl-address-x86_64": 731ef4034f36: Pull complete Step #5 - "build-check-afl-address-x86_64": 922b1ab1d770: Pull complete Step #5 - "build-check-afl-address-x86_64": e99995572309: Pull complete Step #5 - "build-check-afl-address-x86_64": 373eaec1aabb: Pull complete Step #5 - "build-check-afl-address-x86_64": a868ce8f89db: Pull complete Step #5 - "build-check-afl-address-x86_64": 785d944e1d0d: Pull complete Step #5 - "build-check-afl-address-x86_64": Digest: sha256:99b75558b29c3a2b806f3264987609968656e62760b07d74a5ec6464fb47cf9a Step #5 - "build-check-afl-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_padded Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_minifyimpl Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_element Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_parser Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_atpointer Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_print_json Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_dump Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_utf8 Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_implementations Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_minify Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_ondemand Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_dump_raw_tape Step #5 - "build-check-afl-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpu_hxy54b/fuzz_ndjson Finished Step #5 - "build-check-afl-address-x86_64" Starting Step #6 Step #6: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #6 Starting Step #7 Step #7: Already have image: gcr.io/oss-fuzz/simdjson Step #7: adding: SanitizerCoverageLTO.so (deflated 70%) Step #7: adding: SanitizerCoveragePCGUARD.so (deflated 70%) Step #7: adding: afl-addseeds (deflated 56%) Step #7: adding: afl-analyze (deflated 54%) Step #7: adding: afl-as (deflated 63%) Step #7: adding: afl-c++ (deflated 57%) Step #7: adding: afl-c++.8 (deflated 56%) Step #7: adding: afl-cc (deflated 57%) Step #7: adding: afl-cc.8 (deflated 56%) Step #7: adding: afl-clang (deflated 57%) Step #7: adding: afl-clang++ (deflated 57%) Step #7: adding: afl-clang-fast (deflated 57%) Step #7: adding: afl-clang-fast++ (deflated 57%) Step #7: adding: afl-clang-fast++.8 (deflated 56%) Step #7: adding: afl-clang-fast.8 (deflated 56%) Step #7: adding: afl-clang-lto (deflated 57%) Step #7: adding: afl-clang-lto++ (deflated 57%) Step #7: adding: afl-clang-lto++.8 (deflated 56%) Step #7: adding: afl-clang-lto.8 (deflated 56%) Step #7: adding: afl-cmin (deflated 70%) Step #7: adding: afl-cmin.bash (deflated 65%) Step #7: adding: afl-compiler-rt-32.o (deflated 56%) Step #7: adding: afl-compiler-rt-64.o (deflated 67%) Step #7: adding: afl-compiler-rt.o (deflated 67%) Step #7: adding: afl-fuzz (deflated 55%) Step #7: adding: afl-g++ (deflated 57%) Step #7: adding: afl-gcc (deflated 57%) Step #7: adding: afl-gotcpu (deflated 61%) Step #7: adding: afl-ld-lto (deflated 63%) Step #7: adding: afl-llvm-dict2file.so (deflated 69%) Step #7: adding: afl-llvm-lto-instrumentlist.so (deflated 70%) Step #7: adding: afl-llvm-pass.so (deflated 68%) Step #7: adding: afl-llvm-rt-lto-32.o (deflated 21%) Step #7: adding: afl-llvm-rt-lto-64.o (deflated 20%) Step #7: adding: afl-llvm-rt-lto.o (deflated 20%) Step #7: adding: afl-lto (deflated 57%) Step #7: adding: afl-lto++ (deflated 57%) Step #7: adding: afl-lto++.8 (deflated 56%) Step #7: adding: afl-lto.8 (deflated 56%) Step #7: adding: afl-persistent-config (deflated 60%) Step #7: adding: afl-plot (deflated 65%) Step #7: adding: afl-showmap (deflated 55%) Step #7: adding: afl-system-config (deflated 63%) Step #7: adding: afl-tmin (deflated 54%) Step #7: adding: afl-whatsup (deflated 69%) Step #7: adding: afl-wine-trace (deflated 70%) Step #7: adding: afl_options.txt (deflated 20%) Step #7: adding: cmplog-instructions-pass.so (deflated 69%) Step #7: adding: cmplog-routines-pass.so (deflated 70%) Step #7: adding: cmplog-switches-pass.so (deflated 69%) Step #7: adding: compare-transform-pass.so (deflated 69%) Step #7: adding: dynamic_list.txt (deflated 76%) Step #7: adding: fuzz_atpointer (deflated 66%) Step #7: adding: fuzz_atpointer.zip (stored 0%) Step #7: adding: fuzz_dump (deflated 66%) Step #7: adding: fuzz_dump.zip (stored 0%) Step #7: adding: fuzz_dump_raw_tape (deflated 66%) Step #7: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #7: adding: fuzz_element (deflated 66%) Step #7: adding: fuzz_element.zip (stored 0%) Step #7: adding: fuzz_implementations (deflated 66%) Step #7: adding: fuzz_implementations.zip (stored 0%) Step #7: adding: fuzz_minify (deflated 66%) Step #7: adding: fuzz_minify.zip (stored 0%) Step #7: adding: fuzz_minifyimpl (deflated 66%) Step #7: adding: fuzz_minifyimpl.zip (stored 0%) Step #7: adding: fuzz_ndjson (deflated 66%) Step #7: adding: fuzz_ndjson.zip (stored 0%) Step #7: adding: fuzz_ondemand (deflated 66%) Step #7: adding: fuzz_ondemand.zip (stored 0%) Step #7: adding: fuzz_padded (deflated 67%) Step #7: adding: fuzz_padded.zip (stored 0%) Step #7: adding: fuzz_parser (deflated 66%) Step #7: adding: fuzz_parser.zip (stored 0%) Step #7: adding: fuzz_print_json (deflated 66%) Step #7: adding: fuzz_print_json.zip (stored 0%) Step #7: adding: fuzz_utf8 (deflated 66%) Step #7: adding: fuzz_utf8.zip (stored 0%) Step #7: adding: libAFLDriver.a (deflated 64%) Step #7: adding: libAFLQemuDriver.a (deflated 64%) Step #7: adding: llvm-symbolizer (deflated 66%) Step #7: adding: split-compares-pass.so (deflated 68%) Step #7: adding: split-switches-pass.so (deflated 69%) Finished Step #7 Starting Step #8 Step #8: Pulling image: gcr.io/oss-fuzz-base/uploader Step #8: Using default tag: latest Step #8: latest: Pulling from oss-fuzz-base/uploader Step #8: c62795f78da9: Pulling fs layer Step #8: d4fceeeb758e: Pulling fs layer Step #8: 5c9125a401ae: Pulling fs layer Step #8: 0062f774e994: Pulling fs layer Step #8: 6b33fd031fac: Pulling fs layer Step #8: 7eb39101e508: Pulling fs layer Step #8: 89257482f398: Pulling fs layer Step #8: 6b33fd031fac: Waiting Step #8: 7eb39101e508: Waiting Step #8: 0062f774e994: Waiting Step #8: 89257482f398: Waiting Step #8: d4fceeeb758e: Verifying Checksum Step #8: d4fceeeb758e: Download complete Step #8: 5c9125a401ae: Download complete Step #8: 0062f774e994: Verifying Checksum Step #8: 0062f774e994: Download complete Step #8: 6b33fd031fac: Download complete Step #8: 89257482f398: Verifying Checksum Step #8: 89257482f398: Download complete Step #8: c62795f78da9: Verifying Checksum Step #8: c62795f78da9: Download complete Step #8: 7eb39101e508: Verifying Checksum Step #8: 7eb39101e508: Download complete Step #8: c62795f78da9: Pull complete Step #8: d4fceeeb758e: Pull complete Step #8: 5c9125a401ae: Pull complete Step #8: 0062f774e994: Pull complete Step #8: 6b33fd031fac: Pull complete Step #8: 7eb39101e508: Pull complete Step #8: 89257482f398: Pull complete Step #8: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #8: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #8: gcr.io/oss-fuzz-base/uploader:latest Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 763 --:--:-- --:--:-- --:--:-- 762 100 157 0 0 100 157 0 739 --:--:-- --:--:-- --:--:-- 737 Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32.4M 0 0 100 32.4M 0 80.7M --:--:-- --:--:-- --:--:-- 80.7M 100 32.4M 0 0 100 32.4M 0 80.7M --:--:-- --:--:-- --:--:-- 80.7M Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 752 --:--:-- --:--:-- --:--:-- 755 Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/curl Step #11: % Total % Received % Xferd Average Speed Time Time Time Current Step #11: Dload Upload Total Spent Left Speed Step #11: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 142 --:--:-- --:--:-- --:--:-- 143 Finished Step #11 Starting Step #12 Step #12: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #12 Starting Step #13 - "compile-honggfuzz-address-x86_64" Step #13 - "compile-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #13 - "compile-honggfuzz-address-x86_64": vm.mmap_rnd_bits = 28 Step #13 - "compile-honggfuzz-address-x86_64": Skipping compilation; using precompiled honggfuzz Step #13 - "compile-honggfuzz-address-x86_64": done. Step #13 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #13 - "compile-honggfuzz-address-x86_64": CC=clang Step #13 - "compile-honggfuzz-address-x86_64": CXX=clang++ Step #13 - "compile-honggfuzz-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp Step #13 - "compile-honggfuzz-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize-coverage=trace-pc-guard,indirect-calls,trace-cmp -stdlib=libc++ Step #13 - "compile-honggfuzz-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #13 - "compile-honggfuzz-address-x86_64": --------------------------------------------------------------- Step #13 - "compile-honggfuzz-address-x86_64": + fuzz/ossfuzz.sh Step #13 - "compile-honggfuzz-address-x86_64": + which zip Step #13 - "compile-honggfuzz-address-x86_64": + which cmake Step #13 - "compile-honggfuzz-address-x86_64": + which ninja Step #13 - "compile-honggfuzz-address-x86_64": + fuzz/build_corpus.sh Step #13 - "compile-honggfuzz-address-x86_64": + mkdir -p build Step #13 - "compile-honggfuzz-address-x86_64": + cd build Step #13 - "compile-honggfuzz-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=/usr/lib/libFuzzingEngine.a Step #13 - "compile-honggfuzz-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #13 - "compile-honggfuzz-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compiler ABI info - done Step #13 - "compile-honggfuzz-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting CXX compile features - done Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting C compiler ABI info - done Step #13 - "compile-honggfuzz-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features Step #13 - "compile-honggfuzz-address-x86_64": -- Detecting C compile features - done Step #13 - "compile-honggfuzz-address-x86_64": -- Looking for fork Step #13 - "compile-honggfuzz-address-x86_64": -- Looking for fork - found Step #13 - "compile-honggfuzz-address-x86_64": -- Looking for wait Step #13 - "compile-honggfuzz-address-x86_64": -- Looking for wait - found Step #13 - "compile-honggfuzz-address-x86_64": -- Adding -Og to compile flag Step #13 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #13 - "compile-honggfuzz-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #13 - "compile-honggfuzz-address-x86_64": -- Found Threads: TRUE Step #13 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #13 - "compile-honggfuzz-address-x86_64": -- CPM: Adding package cxxopts@ () Step #13 - "compile-honggfuzz-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #13 - "compile-honggfuzz-address-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found version "3.10.14") found components: Interpreter Step #13 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo test. Step #13 - "compile-honggfuzz-address-x86_64": -- Including simdjson-singleheader test. Step #13 - "compile-honggfuzz-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #13 - "compile-honggfuzz-address-x86_64": -- We disable the checkperf targets under Ninja. Step #13 - "compile-honggfuzz-address-x86_64": -- Configuring done (5.4s) Step #13 - "compile-honggfuzz-address-x86_64": -- Generating done (0.1s) Step #13 - "compile-honggfuzz-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #13 - "compile-honggfuzz-address-x86_64": + cmake --build . --target all_fuzzers Step #13 - "compile-honggfuzz-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_ondemand [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_parser [19/28] Linking CXX executable fuzz/fuzz_atpointer [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_print_json [23/28] Linking CXX executable fuzz/fuzz_utf8 [24/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [25/28] Linking CXX executable fuzz/fuzz_dump [26/28] Linking CXX executable fuzz/fuzz_minifyimpl [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_element Step #13 - "compile-honggfuzz-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/honggfuzz-address-x86_64 Step #13 - "compile-honggfuzz-address-x86_64": + + ls /workspace/out/honggfuzz-address-x86_64/fuzz_atpointergrep /workspace/out/honggfuzz-address-x86_64/fuzz_dump -v /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape .zip$ /workspace/out/honggfuzz-address-x86_64/fuzz_element Step #13 - "compile-honggfuzz-address-x86_64": /workspace/out/honggfuzz-address-x86_64/fuzz_implementations /workspace/out/honggfuzz-address-x86_64/fuzz_minify /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand /workspace/out/honggfuzz-address-x86_64/fuzz_padded /workspace/out/honggfuzz-address-x86_64/fuzz_parser /workspace/out/honggfuzz-address-x86_64/fuzz_print_json /workspace/out/honggfuzz-address-x86_64/fuzz_utf8 Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_atpointer.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_dump_raw_tape.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_element Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_element.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_implementations Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_implementations.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minify Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minify.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_minifyimpl.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ndjson.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_ondemand.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_padded Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_padded.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_parser Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_parser.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_print_json Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_print_json.zip Step #13 - "compile-honggfuzz-address-x86_64": + basename /workspace/out/honggfuzz-address-x86_64/fuzz_utf8 Step #13 - "compile-honggfuzz-address-x86_64": + cp ../corpus.zip /workspace/out/honggfuzz-address-x86_64/fuzz_utf8.zip Finished Step #13 - "compile-honggfuzz-address-x86_64" Starting Step #14 - "build-check-honggfuzz-address-x86_64" Step #14 - "build-check-honggfuzz-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_padded Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_minifyimpl Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_element Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_parser Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_atpointer Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_print_json Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_dump Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_utf8 Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_implementations Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_minify Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_ondemand Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_dump_raw_tape Step #14 - "build-check-honggfuzz-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzxe7pyna/fuzz_ndjson Finished Step #14 - "build-check-honggfuzz-address-x86_64" Starting Step #15 Step #15: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #15 Starting Step #16 Step #16: Already have image: gcr.io/oss-fuzz/simdjson Step #16: adding: fuzz_atpointer (deflated 67%) Step #16: adding: fuzz_atpointer.zip (stored 0%) Step #16: adding: fuzz_dump (deflated 67%) Step #16: adding: fuzz_dump.zip (stored 0%) Step #16: adding: fuzz_dump_raw_tape (deflated 67%) Step #16: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #16: adding: fuzz_element (deflated 67%) Step #16: adding: fuzz_element.zip (stored 0%) Step #16: adding: fuzz_implementations (deflated 67%) Step #16: adding: fuzz_implementations.zip (stored 0%) Step #16: adding: fuzz_minify (deflated 67%) Step #16: adding: fuzz_minify.zip (stored 0%) Step #16: adding: fuzz_minifyimpl (deflated 67%) Step #16: adding: fuzz_minifyimpl.zip (stored 0%) Step #16: adding: fuzz_ndjson (deflated 67%) Step #16: adding: fuzz_ndjson.zip (stored 0%) Step #16: adding: fuzz_ondemand (deflated 67%) Step #16: adding: fuzz_ondemand.zip (stored 0%) Step #16: adding: fuzz_padded (deflated 67%) Step #16: adding: fuzz_padded.zip (stored 0%) Step #16: adding: fuzz_parser (deflated 67%) Step #16: adding: fuzz_parser.zip (stored 0%) Step #16: adding: fuzz_print_json (deflated 67%) Step #16: adding: fuzz_print_json.zip (stored 0%) Step #16: adding: fuzz_utf8 (deflated 67%) Step #16: adding: fuzz_utf8.zip (stored 0%) Step #16: adding: honggfuzz (deflated 66%) Step #16: adding: llvm-symbolizer (deflated 66%) Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 721 --:--:-- --:--:-- --:--:-- 723 Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 26.0M 0 0 100 26.0M 0 74.6M --:--:-- --:--:-- --:--:-- 74.7M Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 612 --:--:-- --:--:-- --:--:-- 612 Finished Step #19 Starting Step #20 Step #20: Already have image (with digest): gcr.io/cloud-builders/curl Step #20: % Total % Received % Xferd Average Speed Time Time Time Current Step #20: Dload Upload Total Spent Left Speed Step #20: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 139 --:--:-- --:--:-- --:--:-- 139 Finished Step #20 Starting Step #21 Step #21: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #21 Starting Step #22 - "compile-libfuzzer-address-x86_64" Step #22 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #22 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #22 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #22 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #22 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #22 - "compile-libfuzzer-address-x86_64": CC=clang Step #22 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #22 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #22 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #22 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #22 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #22 - "compile-libfuzzer-address-x86_64": + fuzz/ossfuzz.sh Step #22 - "compile-libfuzzer-address-x86_64": + which zip Step #22 - "compile-libfuzzer-address-x86_64": + which cmake Step #22 - "compile-libfuzzer-address-x86_64": + which ninja Step #22 - "compile-libfuzzer-address-x86_64": + fuzz/build_corpus.sh Step #22 - "compile-libfuzzer-address-x86_64": + mkdir -p build Step #22 - "compile-libfuzzer-address-x86_64": + cd build Step #22 - "compile-libfuzzer-address-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #22 - "compile-libfuzzer-address-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #22 - "compile-libfuzzer-address-x86_64": -- The C compiler identification is Clang 18.1.8 Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compiler ABI info - done Step #22 - "compile-libfuzzer-address-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting CXX compile features - done Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting C compiler ABI info - done Step #22 - "compile-libfuzzer-address-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features Step #22 - "compile-libfuzzer-address-x86_64": -- Detecting C compile features - done Step #22 - "compile-libfuzzer-address-x86_64": -- Looking for fork Step #22 - "compile-libfuzzer-address-x86_64": -- Looking for fork - found Step #22 - "compile-libfuzzer-address-x86_64": -- Looking for wait Step #22 - "compile-libfuzzer-address-x86_64": -- Looking for wait - found Step #22 - "compile-libfuzzer-address-x86_64": -- Adding -Og to compile flag Step #22 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #22 - "compile-libfuzzer-address-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #22 - "compile-libfuzzer-address-x86_64": -- Found Threads: TRUE Step #22 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package simdjson-data@ () Step #22 - "compile-libfuzzer-address-x86_64": -- CPM: Adding package cxxopts@ () Step #22 - "compile-libfuzzer-address-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #22 - "compile-libfuzzer-address-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found version "3.10.14") found components: Interpreter Step #22 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo test. Step #22 - "compile-libfuzzer-address-x86_64": -- Including simdjson-singleheader test. Step #22 - "compile-libfuzzer-address-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #22 - "compile-libfuzzer-address-x86_64": -- We disable the checkperf targets under Ninja. Step #22 - "compile-libfuzzer-address-x86_64": -- Configuring done (5.2s) Step #22 - "compile-libfuzzer-address-x86_64": -- Generating done (0.1s) Step #22 - "compile-libfuzzer-address-x86_64": -- Build files have been written to: /src/simdjson/build Step #22 - "compile-libfuzzer-address-x86_64": + cmake --build . --target all_fuzzers Step #22 - "compile-libfuzzer-address-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_parser [17/28] Linking CXX executable fuzz/fuzz_minify [18/28] Linking CXX executable fuzz/fuzz_ondemand [19/28] Linking CXX executable fuzz/fuzz_atpointer [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_minifyimpl [23/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [24/28] Linking CXX executable fuzz/fuzz_print_json [25/28] Linking CXX executable fuzz/fuzz_dump [26/28] Linking CXX executable fuzz/fuzz_utf8 [27/28] Linking CXX executable fuzz/fuzz_implementations [28/28] Linking CXX executable fuzz/fuzz_element Step #22 - "compile-libfuzzer-address-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-address-x86_64 Step #22 - "compile-libfuzzer-address-x86_64": + + ls /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer /workspace/out/libfuzzer-address-x86_64/fuzz_dump /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-address-x86_64/fuzz_element /workspace/out/libfuzzer-address-x86_64/fuzz_implementations /workspace/out/libfuzzer-address-x86_64/fuzz_minify /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimplgrep /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson -v /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand .zip$ /workspace/out/libfuzzer-address-x86_64/fuzz_padded Step #22 - "compile-libfuzzer-address-x86_64": /workspace/out/libfuzzer-address-x86_64/fuzz_parser /workspace/out/libfuzzer-address-x86_64/fuzz_print_json /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_atpointer.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_dump_raw_tape.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_element Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_element.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_implementations Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_implementations.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minify Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minify.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_minifyimpl.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ndjson.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_ondemand.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_padded Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_padded.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_parser Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_parser.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_print_json Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_print_json.zip Step #22 - "compile-libfuzzer-address-x86_64": + basename /workspace/out/libfuzzer-address-x86_64/fuzz_utf8 Step #22 - "compile-libfuzzer-address-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-address-x86_64/fuzz_utf8.zip Finished Step #22 - "compile-libfuzzer-address-x86_64" Starting Step #23 - "build-check-libfuzzer-address-x86_64" Step #23 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_padded Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_minifyimpl Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_element Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_parser Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_atpointer Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_print_json Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_dump Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_utf8 Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_implementations Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_minify Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_ondemand Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_dump_raw_tape Step #23 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp8rhx28hh/fuzz_ndjson Finished Step #23 - "build-check-libfuzzer-address-x86_64" Starting Step #24 Step #24: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #24 Starting Step #25 Step #25: Already have image: gcr.io/oss-fuzz/simdjson Step #25: adding: fuzz_atpointer (deflated 67%) Step #25: adding: fuzz_atpointer.zip (stored 0%) Step #25: adding: fuzz_dump (deflated 67%) Step #25: adding: fuzz_dump.zip (stored 0%) Step #25: adding: fuzz_dump_raw_tape (deflated 67%) Step #25: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #25: adding: fuzz_element (deflated 67%) Step #25: adding: fuzz_element.zip (stored 0%) Step #25: adding: fuzz_implementations (deflated 67%) Step #25: adding: fuzz_implementations.zip (stored 0%) Step #25: adding: fuzz_minify (deflated 67%) Step #25: adding: fuzz_minify.zip (stored 0%) Step #25: adding: fuzz_minifyimpl (deflated 67%) Step #25: adding: fuzz_minifyimpl.zip (stored 0%) Step #25: adding: fuzz_ndjson (deflated 67%) Step #25: adding: fuzz_ndjson.zip (stored 0%) Step #25: adding: fuzz_ondemand (deflated 67%) Step #25: adding: fuzz_ondemand.zip (stored 0%) Step #25: adding: fuzz_padded (deflated 67%) Step #25: adding: fuzz_padded.zip (stored 0%) Step #25: adding: fuzz_parser (deflated 67%) Step #25: adding: fuzz_parser.zip (stored 0%) Step #25: adding: fuzz_print_json (deflated 67%) Step #25: adding: fuzz_print_json.zip (stored 0%) Step #25: adding: fuzz_utf8 (deflated 67%) Step #25: adding: fuzz_utf8.zip (stored 0%) Step #25: adding: llvm-symbolizer (deflated 66%) Finished Step #25 Starting Step #26 Step #26: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #26: % Total % Received % Xferd Average Speed Time Time Time Current Step #26: Dload Upload Total Spent Left Speed Step #26: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 770 --:--:-- --:--:-- --:--:-- 773 Finished Step #26 Starting Step #27 Step #27: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #27: % Total % Received % Xferd Average Speed Time Time Time Current Step #27: Dload Upload Total Spent Left Speed Step #27: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 53 34.2M 0 0 53 18.2M 0 145M --:--:-- --:--:-- --:--:-- 145M 100 34.2M 0 0 100 34.2M 0 101M --:--:-- --:--:-- --:--:-- 101M Finished Step #27 Starting Step #28 Step #28: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #28: % Total % Received % Xferd Average Speed Time Time Time Current Step #28: Dload Upload Total Spent Left Speed Step #28: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 888 --:--:-- --:--:-- --:--:-- 887 100 182 0 0 100 182 0 557 --:--:-- --:--:-- --:--:-- 556 Finished Step #28 Starting Step #29 Step #29: Already have image (with digest): gcr.io/cloud-builders/curl Step #29: % Total % Received % Xferd Average Speed Time Time Time Current Step #29: Dload Upload Total Spent Left Speed Step #29: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 147 --:--:-- --:--:-- --:--:-- 147 Finished Step #29 Starting Step #30 Step #30: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #30 Starting Step #31 - "compile-libfuzzer-memory-x86_64" Step #31 - "compile-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #31 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #31 - "compile-libfuzzer-memory-x86_64": vm.mmap_rnd_bits = 28 Step #31 - "compile-libfuzzer-memory-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #31 - "compile-libfuzzer-memory-x86_64": Building without MSan instrumented libraries. Step #31 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #31 - "compile-libfuzzer-memory-x86_64": CC=clang Step #31 - "compile-libfuzzer-memory-x86_64": CXX=clang++ Step #31 - "compile-libfuzzer-memory-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link Step #31 - "compile-libfuzzer-memory-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=memory -fsanitize-memory-track-origins -fsanitize=fuzzer-no-link -stdlib=libc++ Step #31 - "compile-libfuzzer-memory-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=memory -Cdebuginfo=1 -Cforce-frame-pointers Step #31 - "compile-libfuzzer-memory-x86_64": --------------------------------------------------------------- Step #31 - "compile-libfuzzer-memory-x86_64": + fuzz/ossfuzz.sh Step #31 - "compile-libfuzzer-memory-x86_64": + which zip Step #31 - "compile-libfuzzer-memory-x86_64": + which cmake Step #31 - "compile-libfuzzer-memory-x86_64": + which ninja Step #31 - "compile-libfuzzer-memory-x86_64": + fuzz/build_corpus.sh Step #31 - "compile-libfuzzer-memory-x86_64": + mkdir -p build Step #31 - "compile-libfuzzer-memory-x86_64": + cd build Step #31 - "compile-libfuzzer-memory-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #31 - "compile-libfuzzer-memory-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #31 - "compile-libfuzzer-memory-x86_64": -- The C compiler identification is Clang 18.1.8 Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compiler ABI info - done Step #31 - "compile-libfuzzer-memory-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting CXX compile features - done Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting C compiler ABI info - done Step #31 - "compile-libfuzzer-memory-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features Step #31 - "compile-libfuzzer-memory-x86_64": -- Detecting C compile features - done Step #31 - "compile-libfuzzer-memory-x86_64": -- Looking for fork Step #31 - "compile-libfuzzer-memory-x86_64": -- Looking for fork - found Step #31 - "compile-libfuzzer-memory-x86_64": -- Looking for wait Step #31 - "compile-libfuzzer-memory-x86_64": -- Looking for wait - found Step #31 - "compile-libfuzzer-memory-x86_64": -- Adding -Og to compile flag Step #31 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #31 - "compile-libfuzzer-memory-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #31 - "compile-libfuzzer-memory-x86_64": -- Found Threads: TRUE Step #31 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package simdjson-data@ () Step #31 - "compile-libfuzzer-memory-x86_64": -- CPM: Adding package cxxopts@ () Step #31 - "compile-libfuzzer-memory-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #31 - "compile-libfuzzer-memory-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found version "3.10.14") found components: Interpreter Step #31 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo test. Step #31 - "compile-libfuzzer-memory-x86_64": -- Including simdjson-singleheader test. Step #31 - "compile-libfuzzer-memory-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #31 - "compile-libfuzzer-memory-x86_64": -- We disable the checkperf targets under Ninja. Step #31 - "compile-libfuzzer-memory-x86_64": -- Configuring done (4.3s) Step #31 - "compile-libfuzzer-memory-x86_64": -- Generating done (0.1s) Step #31 - "compile-libfuzzer-memory-x86_64": -- Build files have been written to: /src/simdjson/build Step #31 - "compile-libfuzzer-memory-x86_64": + cmake --build . --target all_fuzzers Step #31 - "compile-libfuzzer-memory-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_parser [17/28] Linking CXX executable fuzz/fuzz_ondemand [18/28] Linking CXX executable fuzz/fuzz_atpointer [19/28] Linking CXX executable fuzz/fuzz_minify [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [23/28] Linking CXX executable fuzz/fuzz_dump [24/28] Linking CXX executable fuzz/fuzz_utf8 [25/28] Linking CXX executable fuzz/fuzz_element [26/28] Linking CXX executable fuzz/fuzz_print_json [27/28] Linking CXX executable fuzz/fuzz_minifyimpl [28/28] Linking CXX executable fuzz/fuzz_implementations Step #31 - "compile-libfuzzer-memory-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-memory-x86_64 Step #31 - "compile-libfuzzer-memory-x86_64": + + ls /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer /workspace/out/libfuzzer-memory-x86_64/fuzz_dump /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-memory-x86_64/fuzz_element /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations /workspace/out/libfuzzer-memory-x86_64/fuzz_minify /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimplgrep /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson -v /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand .zip$ /workspace/out/libfuzzer-memory-x86_64/fuzz_padded Step #31 - "compile-libfuzzer-memory-x86_64": /workspace/out/libfuzzer-memory-x86_64/fuzz_parser /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_atpointer.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_dump_raw_tape.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_element Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_element.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_implementations.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minify Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minify.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_minifyimpl.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ndjson.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_ondemand.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_padded Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_padded.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_parser Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_parser.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_print_json.zip Step #31 - "compile-libfuzzer-memory-x86_64": + basename /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8 Step #31 - "compile-libfuzzer-memory-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-memory-x86_64/fuzz_utf8.zip Finished Step #31 - "compile-libfuzzer-memory-x86_64" Starting Step #32 - "build-check-libfuzzer-memory-x86_64" Step #32 - "build-check-libfuzzer-memory-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_padded Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_minifyimpl Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_element Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_parser Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_atpointer Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_print_json Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_dump Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_utf8 Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_implementations Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_minify Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_ondemand Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_dump_raw_tape Step #32 - "build-check-libfuzzer-memory-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpl69qo4lo/fuzz_ndjson Finished Step #32 - "build-check-libfuzzer-memory-x86_64" Starting Step #33 Step #33: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #33 Starting Step #34 Step #34: Already have image: gcr.io/oss-fuzz/simdjson Step #34: adding: fuzz_atpointer (deflated 66%) Step #34: adding: fuzz_atpointer.zip (stored 0%) Step #34: adding: fuzz_dump (deflated 66%) Step #34: adding: fuzz_dump.zip (stored 0%) Step #34: adding: fuzz_dump_raw_tape (deflated 66%) Step #34: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #34: adding: fuzz_element (deflated 66%) Step #34: adding: fuzz_element.zip (stored 0%) Step #34: adding: fuzz_implementations (deflated 66%) Step #34: adding: fuzz_implementations.zip (stored 0%) Step #34: adding: fuzz_minify (deflated 66%) Step #34: adding: fuzz_minify.zip (stored 0%) Step #34: adding: fuzz_minifyimpl (deflated 66%) Step #34: adding: fuzz_minifyimpl.zip (stored 0%) Step #34: adding: fuzz_ndjson (deflated 66%) Step #34: adding: fuzz_ndjson.zip (stored 0%) Step #34: adding: fuzz_ondemand (deflated 66%) Step #34: adding: fuzz_ondemand.zip (stored 0%) Step #34: adding: fuzz_padded (deflated 66%) Step #34: adding: fuzz_padded.zip (stored 0%) Step #34: adding: fuzz_parser (deflated 66%) Step #34: adding: fuzz_parser.zip (stored 0%) Step #34: adding: fuzz_print_json (deflated 66%) Step #34: adding: fuzz_print_json.zip (stored 0%) Step #34: adding: fuzz_utf8 (deflated 66%) Step #34: adding: fuzz_utf8.zip (stored 0%) Step #34: adding: llvm-symbolizer (deflated 66%) Finished Step #34 Starting Step #35 Step #35: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #35: % Total % Received % Xferd Average Speed Time Time Time Current Step #35: Dload Upload Total Spent Left Speed Step #35: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 756 --:--:-- --:--:-- --:--:-- 758 Finished Step #35 Starting Step #36 Step #36: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #36: % Total % Received % Xferd Average Speed Time Time Time Current Step #36: Dload Upload Total Spent Left Speed Step #36: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 41.5M 0 0 100 41.5M 0 89.9M --:--:-- --:--:-- --:--:-- 90.0M Finished Step #36 Starting Step #37 Step #37: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #37: % Total % Received % Xferd Average Speed Time Time Time Current Step #37: Dload Upload Total Spent Left Speed Step #37: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 613 --:--:-- --:--:-- --:--:-- 614 Finished Step #37 Starting Step #38 Step #38: Already have image (with digest): gcr.io/cloud-builders/curl Step #38: % Total % Received % Xferd Average Speed Time Time Time Current Step #38: Dload Upload Total Spent Left Speed Step #38: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 32 0 0 100 32 0 157 --:--:-- --:--:-- --:--:-- 157 Finished Step #38 Starting Step #39 Step #39: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #39 Starting Step #40 - "compile-libfuzzer-undefined-x86_64" Step #40 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #40 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #40 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #40 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #40 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #40 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #40 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #40 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function Step #40 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ Step #40 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #40 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #40 - "compile-libfuzzer-undefined-x86_64": + fuzz/ossfuzz.sh Step #40 - "compile-libfuzzer-undefined-x86_64": + which zip Step #40 - "compile-libfuzzer-undefined-x86_64": + which cmake Step #40 - "compile-libfuzzer-undefined-x86_64": + which ninja Step #40 - "compile-libfuzzer-undefined-x86_64": + fuzz/build_corpus.sh Step #40 - "compile-libfuzzer-undefined-x86_64": + mkdir -p build Step #40 - "compile-libfuzzer-undefined-x86_64": + cd build Step #40 - "compile-libfuzzer-undefined-x86_64": + cmake .. -GNinja -DCMAKE_BUILD_TYPE=Debug -DSIMDJSON_DEVELOPER_MODE=ON -DBUILD_SHARED_LIBS=OFF -DSIMDJSON_ENABLE_FUZZING=On -DSIMDJSON_COMPETITION=Off -DSIMDJSON_FUZZ_LINKMAIN=Off -DSIMDJSON_GOOGLE_BENCHMARKS=Off -DSIMDJSON_DISABLE_DEPRECATED_API=On -DSIMDJSON_FUZZ_LDFLAGS=-fsanitize=fuzzer Step #40 - "compile-libfuzzer-undefined-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #40 - "compile-libfuzzer-undefined-x86_64": -- The C compiler identification is Clang 18.1.8 Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compiler ABI info - done Step #40 - "compile-libfuzzer-undefined-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting CXX compile features - done Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compiler ABI info - done Step #40 - "compile-libfuzzer-undefined-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features Step #40 - "compile-libfuzzer-undefined-x86_64": -- Detecting C compile features - done Step #40 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork Step #40 - "compile-libfuzzer-undefined-x86_64": -- Looking for fork - found Step #40 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait Step #40 - "compile-libfuzzer-undefined-x86_64": -- Looking for wait - found Step #40 - "compile-libfuzzer-undefined-x86_64": -- Adding -Og to compile flag Step #40 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #40 - "compile-libfuzzer-undefined-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #40 - "compile-libfuzzer-undefined-x86_64": -- Found Threads: TRUE Step #40 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package simdjson-data@ () Step #40 - "compile-libfuzzer-undefined-x86_64": -- CPM: Adding package cxxopts@ () Step #40 - "compile-libfuzzer-undefined-x86_64": -- We have cxxopts as a dependency and we are building the tools (e.g., json2json). Step #40 - "compile-libfuzzer-undefined-x86_64": -- Found Python3: /usr/local/bin/python3.10 (found version "3.10.14") found components: Interpreter Step #40 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo test. Step #40 - "compile-libfuzzer-undefined-x86_64": -- Including simdjson-singleheader test. Step #40 - "compile-libfuzzer-undefined-x86_64": -- Including amalgamate_demo_direct_from_repository test. Step #40 - "compile-libfuzzer-undefined-x86_64": -- We disable the checkperf targets under Ninja. Step #40 - "compile-libfuzzer-undefined-x86_64": -- Configuring done (4.4s) Step #40 - "compile-libfuzzer-undefined-x86_64": -- Generating done (0.1s) Step #40 - "compile-libfuzzer-undefined-x86_64": -- Build files have been written to: /src/simdjson/build Step #40 - "compile-libfuzzer-undefined-x86_64": + cmake --build . --target all_fuzzers Step #40 - "compile-libfuzzer-undefined-x86_64": [0/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [0/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [1/28] Building CXX object fuzz/CMakeFiles/fuzz_parser.dir/fuzz_parser.cpp.o [2/28] Building CXX object fuzz/CMakeFiles/fuzz_padded.dir/fuzz_padded.cpp.o [3/28] Building CXX object fuzz/CMakeFiles/fuzz_utf8.dir/fuzz_utf8.cpp.o [4/28] Building CXX object fuzz/CMakeFiles/fuzz_dump_raw_tape.dir/fuzz_dump_raw_tape.cpp.o [5/28] Building CXX object fuzz/CMakeFiles/fuzz_dump.dir/fuzz_dump.cpp.o [6/28] Building CXX object fuzz/CMakeFiles/fuzz_atpointer.dir/fuzz_atpointer.cpp.o [7/28] Building CXX object fuzz/CMakeFiles/fuzz_ndjson.dir/fuzz_ndjson.cpp.o [8/28] Building CXX object fuzz/CMakeFiles/fuzz_minifyimpl.dir/fuzz_minifyimpl.cpp.o [9/28] Building CXX object fuzz/CMakeFiles/fuzz_minify.dir/fuzz_minify.cpp.o [10/28] Building CXX object fuzz/CMakeFiles/fuzz_print_json.dir/fuzz_print_json.cpp.o [11/28] Building CXX object fuzz/CMakeFiles/fuzz_implementations.dir/fuzz_implementations.cpp.o [12/28] Building CXX object fuzz/CMakeFiles/fuzz_element.dir/fuzz_element.cpp.o [13/28] Building CXX object fuzz/CMakeFiles/fuzz_ondemand.dir/fuzz_ondemand.cpp.o [14/28] Building CXX object CMakeFiles/simdjson.dir/src/simdjson.cpp.o [14/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX static library libsimdjson.a [15/28] Linking CXX executable fuzz/fuzz_atpointer [15/28] Linking CXX executable fuzz/fuzz_dump [15/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [15/28] Linking CXX executable fuzz/fuzz_element [15/28] Linking CXX executable fuzz/fuzz_implementations [15/28] Linking CXX executable fuzz/fuzz_minify [15/28] Linking CXX executable fuzz/fuzz_minifyimpl [15/28] Linking CXX executable fuzz/fuzz_ndjson [15/28] Linking CXX executable fuzz/fuzz_ondemand [15/28] Linking CXX executable fuzz/fuzz_padded [15/28] Linking CXX executable fuzz/fuzz_parser [15/28] Linking CXX executable fuzz/fuzz_print_json [15/28] Linking CXX executable fuzz/fuzz_utf8 [16/28] Linking CXX executable fuzz/fuzz_atpointer [17/28] Linking CXX executable fuzz/fuzz_parser [18/28] Linking CXX executable fuzz/fuzz_minify [19/28] Linking CXX executable fuzz/fuzz_ondemand [20/28] Linking CXX executable fuzz/fuzz_ndjson [21/28] Linking CXX executable fuzz/fuzz_padded [22/28] Linking CXX executable fuzz/fuzz_print_json [23/28] Linking CXX executable fuzz/fuzz_minifyimpl [24/28] Linking CXX executable fuzz/fuzz_dump_raw_tape [25/28] Linking CXX executable fuzz/fuzz_utf8 [26/28] Linking CXX executable fuzz/fuzz_implementations [27/28] Linking CXX executable fuzz/fuzz_dump [28/28] Linking CXX executable fuzz/fuzz_element Step #40 - "compile-libfuzzer-undefined-x86_64": + cp fuzz/fuzz_atpointer fuzz/fuzz_dump fuzz/fuzz_dump_raw_tape fuzz/fuzz_element fuzz/fuzz_implementations fuzz/fuzz_minify fuzz/fuzz_minifyimpl fuzz/fuzz_ndjson fuzz/fuzz_ondemand fuzz/fuzz_padded fuzz/fuzz_parser fuzz/fuzz_print_json fuzz/fuzz_utf8 /workspace/out/libfuzzer-undefined-x86_64 Step #40 - "compile-libfuzzer-undefined-x86_64": + ls+ /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape /workspace/out/libfuzzer-undefined-x86_64/fuzz_element /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemandgrep /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded -v /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser .zip$ /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json Step #40 - "compile-libfuzzer-undefined-x86_64": /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_atpointer.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_dump_raw_tape.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_element Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_element.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_implementations.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minify.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_minifyimpl.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ndjson.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_ondemand.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_padded.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_parser.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_print_json.zip Step #40 - "compile-libfuzzer-undefined-x86_64": + basename /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8 Step #40 - "compile-libfuzzer-undefined-x86_64": + cp ../corpus.zip /workspace/out/libfuzzer-undefined-x86_64/fuzz_utf8.zip Finished Step #40 - "compile-libfuzzer-undefined-x86_64" Starting Step #41 - "build-check-libfuzzer-undefined-x86_64" Step #41 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_padded Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_minifyimpl Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_element Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_parser Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_atpointer Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_print_json Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_dump Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_utf8 Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_implementations Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_minify Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_ondemand Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_dump_raw_tape Step #41 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp_zzh25_t/fuzz_ndjson Finished Step #41 - "build-check-libfuzzer-undefined-x86_64" Starting Step #42 Step #42: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #42 Starting Step #43 Step #43: Already have image: gcr.io/oss-fuzz/simdjson Step #43: adding: fuzz_atpointer (deflated 67%) Step #43: adding: fuzz_atpointer.zip (stored 0%) Step #43: adding: fuzz_dump (deflated 68%) Step #43: adding: fuzz_dump.zip (stored 0%) Step #43: adding: fuzz_dump_raw_tape (deflated 68%) Step #43: adding: fuzz_dump_raw_tape.zip (stored 0%) Step #43: adding: fuzz_element (deflated 68%) Step #43: adding: fuzz_element.zip (stored 0%) Step #43: adding: fuzz_implementations (deflated 68%) Step #43: adding: fuzz_implementations.zip (stored 0%) Step #43: adding: fuzz_minify (deflated 67%) Step #43: adding: fuzz_minify.zip (stored 0%) Step #43: adding: fuzz_minifyimpl (deflated 68%) Step #43: adding: fuzz_minifyimpl.zip (stored 0%) Step #43: adding: fuzz_ndjson (deflated 67%) Step #43: adding: fuzz_ndjson.zip (stored 0%) Step #43: adding: fuzz_ondemand (deflated 67%) Step #43: adding: fuzz_ondemand.zip (stored 0%) Step #43: adding: fuzz_padded (deflated 67%) Step #43: adding: fuzz_padded.zip (stored 0%) Step #43: adding: fuzz_parser (deflated 67%) Step #43: adding: fuzz_parser.zip (stored 0%) Step #43: adding: fuzz_print_json (deflated 68%) Step #43: adding: fuzz_print_json.zip (stored 0%) Step #43: adding: fuzz_utf8 (deflated 68%) Step #43: adding: fuzz_utf8.zip (stored 0%) Step #43: adding: llvm-symbolizer (deflated 66%) Finished Step #43 Starting Step #44 Step #44: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #44: % Total % Received % Xferd Average Speed Time Time Time Current Step #44: Dload Upload Total Spent Left Speed Step #44: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 157 0 0 100 157 0 763 --:--:-- --:--:-- --:--:-- 765 Finished Step #44 Starting Step #45 Step #45: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #45: % Total % Received % Xferd Average Speed Time Time Time Current Step #45: Dload Upload Total Spent Left Speed Step #45: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 25.7M 0 0 100 25.7M 0 83.1M --:--:-- --:--:-- --:--:-- 83.3M Finished Step #45 Starting Step #46 Step #46: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #46: % Total % Received % Xferd Average Speed Time Time Time Current Step #46: Dload Upload Total Spent Left Speed Step #46: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 182 0 0 100 182 0 580 --:--:-- --:--:-- --:--:-- 581 Finished Step #46 Starting Step #47 Step #47: Already have image (with digest): gcr.io/cloud-builders/curl Step #47: % Total % Received % Xferd Average Speed Time Time Time Current Step #47: Dload Upload Total Spent Left Speed Step #47: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 185 --:--:-- --:--:-- --:--:-- 185 Finished Step #47 Starting Step #48 Step #48: Already have image: gcr.io/oss-fuzz/simdjson Finished Step #48 PUSH DONE