starting build "b7b2b114-8827-4c1e-b6f0-89b560f443a7" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 16.9kB Step #1: Step 1/11 : FROM gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: d993ff311503: Pulling fs layer Step #1: 5faf80b993b8: Pulling fs layer Step #1: 7946d0b643b7: Pulling fs layer Step #1: eb738e08bf3b: Pulling fs layer Step #1: 248822a2340b: Pulling fs layer Step #1: fa316482a80e: Pulling fs layer Step #1: 3393bbb458d0: Pulling fs layer Step #1: a8fda90a5506: Pulling fs layer Step #1: afcadef54a23: Pulling fs layer Step #1: 4e97a59f9033: Pulling fs layer Step #1: 4a03bd5b3e5c: Pulling fs layer Step #1: be0ac42f34b4: Pulling fs layer Step #1: 7aa9bde37b90: Pulling fs layer Step #1: 95ec4b1337ee: Pulling fs layer Step #1: 19b55f7a831c: Pulling fs layer Step #1: e9c556d304cd: Pulling fs layer Step #1: f9c1e39d9c40: Pulling fs layer Step #1: 5807a1e31ffb: Pulling fs layer Step #1: acc07ec90c58: Pulling fs layer Step #1: 95ec4b1337ee: Waiting Step #1: d143eec22c7b: Pulling fs layer Step #1: 34c38be78f62: Pulling fs layer Step #1: aa952184efec: Pulling fs layer Step #1: cb7850020c26: Pulling fs layer Step #1: 19b55f7a831c: Waiting Step #1: 9a4eb374175f: Pulling fs layer Step #1: b453205b01ff: Pulling fs layer Step #1: fbea61822e28: Pulling fs layer Step #1: eb738e08bf3b: Waiting Step #1: 66724beef5c1: Pulling fs layer Step #1: 248822a2340b: Waiting Step #1: a204a5883dc9: Pulling fs layer Step #1: 4a03bd5b3e5c: Waiting Step #1: cb7850020c26: Waiting Step #1: fa316482a80e: Waiting Step #1: f9c1e39d9c40: Waiting Step #1: 9a4eb374175f: Waiting Step #1: 62abd8198968: Pulling fs layer Step #1: 7946d0b643b7: Waiting Step #1: 5807a1e31ffb: Waiting Step #1: b453205b01ff: Waiting Step #1: acc07ec90c58: Waiting Step #1: a204a5883dc9: Waiting Step #1: 66724beef5c1: Waiting Step #1: aa952184efec: Waiting Step #1: d143eec22c7b: Waiting Step #1: be0ac42f34b4: Waiting Step #1: fbea61822e28: Waiting Step #1: a8fda90a5506: Waiting Step #1: 3393bbb458d0: Waiting Step #1: 4e97a59f9033: Waiting Step #1: 5faf80b993b8: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: eb738e08bf3b: Verifying Checksum Step #1: eb738e08bf3b: Download complete Step #1: 248822a2340b: Verifying Checksum Step #1: 248822a2340b: Download complete Step #1: 7946d0b643b7: Verifying Checksum Step #1: 7946d0b643b7: Download complete Step #1: 3393bbb458d0: Verifying Checksum Step #1: 3393bbb458d0: Download complete Step #1: a8fda90a5506: Download complete Step #1: d993ff311503: Verifying Checksum Step #1: d993ff311503: Download complete Step #1: b549f31133a9: Pull complete Step #1: 4e97a59f9033: Verifying Checksum Step #1: 4e97a59f9033: Download complete Step #1: 4a03bd5b3e5c: Verifying Checksum Step #1: 4a03bd5b3e5c: Download complete Step #1: be0ac42f34b4: Verifying Checksum Step #1: be0ac42f34b4: Download complete Step #1: 7aa9bde37b90: Verifying Checksum Step #1: 7aa9bde37b90: Download complete Step #1: 95ec4b1337ee: Download complete Step #1: 19b55f7a831c: Download complete Step #1: e9c556d304cd: Download complete Step #1: afcadef54a23: Verifying Checksum Step #1: afcadef54a23: Download complete Step #1: f9c1e39d9c40: Verifying Checksum Step #1: f9c1e39d9c40: Download complete Step #1: 5807a1e31ffb: Verifying Checksum Step #1: 5807a1e31ffb: Download complete Step #1: acc07ec90c58: Verifying Checksum Step #1: acc07ec90c58: Download complete Step #1: d143eec22c7b: Verifying Checksum Step #1: d143eec22c7b: Download complete Step #1: 34c38be78f62: Verifying Checksum Step #1: 34c38be78f62: Download complete Step #1: aa952184efec: Verifying Checksum Step #1: aa952184efec: Download complete Step #1: cb7850020c26: Download complete Step #1: 9a4eb374175f: Verifying Checksum Step #1: 9a4eb374175f: Download complete Step #1: b453205b01ff: Verifying Checksum Step #1: b453205b01ff: Download complete Step #1: 66724beef5c1: Download complete Step #1: fbea61822e28: Verifying Checksum Step #1: fbea61822e28: Download complete Step #1: a204a5883dc9: Download complete Step #1: 62abd8198968: Download complete Step #1: d993ff311503: Pull complete Step #1: 5faf80b993b8: Pull complete Step #1: 7946d0b643b7: Pull complete Step #1: eb738e08bf3b: Pull complete Step #1: 248822a2340b: Pull complete Step #1: fa316482a80e: Verifying Checksum Step #1: fa316482a80e: Download complete Step #1: fa316482a80e: Pull complete Step #1: 3393bbb458d0: Pull complete Step #1: a8fda90a5506: Pull complete Step #1: afcadef54a23: Pull complete Step #1: 4e97a59f9033: Pull complete Step #1: 4a03bd5b3e5c: Pull complete Step #1: be0ac42f34b4: Pull complete Step #1: 7aa9bde37b90: Pull complete Step #1: 95ec4b1337ee: Pull complete Step #1: 19b55f7a831c: Pull complete Step #1: e9c556d304cd: Pull complete Step #1: f9c1e39d9c40: Pull complete Step #1: 5807a1e31ffb: Pull complete Step #1: acc07ec90c58: Pull complete Step #1: d143eec22c7b: Pull complete Step #1: 34c38be78f62: Pull complete Step #1: aa952184efec: Pull complete Step #1: cb7850020c26: Pull complete Step #1: 9a4eb374175f: Pull complete Step #1: b453205b01ff: Pull complete Step #1: fbea61822e28: Pull complete Step #1: 66724beef5c1: Pull complete Step #1: a204a5883dc9: Pull complete Step #1: 62abd8198968: Pull complete Step #1: Digest: sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: ---> e39a0777485f Step #1: Step 2/11 : RUN apt-get update && apt-get install -y --no-install-recommends curl rsync && apt-get clean && rm -rf /var/lib/apt/lists/* Step #1: ---> Running in c2f980771159 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Get:4 http://security.ubuntu.com/ubuntu focal-security/restricted i386 Packages [44.0 kB] Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1203 kB] Step #1: Get:6 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [811 kB] Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 Packages [3571 kB] Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 Packages [29.8 kB] Step #1: Get:9 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [3629 kB] Step #1: Hit:10 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Get:11 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [921 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1204 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [973 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4104 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/multiverse amd64 Packages [32.5 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/restricted amd64 Packages [3721 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1500 kB] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal-updates/restricted i386 Packages [45.7 kB] Step #1: Fetched 22.0 MB in 2s (10.2 MB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: rsync is already the newest version (3.1.3-8ubuntu0.7). Step #1: The following packages will be upgraded: Step #1: curl libcurl4 Step #1: 2 upgraded, 0 newly installed, 0 to remove and 22 not upgraded. Step #1: Need to get 396 kB of archives. Step #1: After this operation, 0 B of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 curl amd64 7.68.0-1ubuntu2.22 [161 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcurl4 amd64 7.68.0-1ubuntu2.22 [235 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 396 kB in 0s (913 kB/s) Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../curl_7.68.0-1ubuntu2.22_amd64.deb ... Step #1: Unpacking curl (7.68.0-1ubuntu2.22) over (7.68.0-1ubuntu2.21) ... Step #1: Preparing to unpack .../libcurl4_7.68.0-1ubuntu2.22_amd64.deb ... Step #1: Unpacking libcurl4:amd64 (7.68.0-1ubuntu2.22) over (7.68.0-1ubuntu2.21) ... Step #1: Setting up libcurl4:amd64 (7.68.0-1ubuntu2.22) ... Step #1: Setting up curl (7.68.0-1ubuntu2.22) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Removing intermediate container c2f980771159 Step #1: ---> b3a568fe02a6 Step #1: Step 3/11 : RUN python3 -m pip install numpy Step #1: ---> Running in e117d4fe5da1 Step #1: Collecting numpy Step #1: Downloading https://files.pythonhosted.org/packages/a4/9b/027bec52c633f6556dba6b722d9a0befb40498b9ceddd29cbe67a45a127c/numpy-1.24.4.tar.gz (10.9MB) Step #1: Installing build dependencies: started Step #1: Installing build dependencies: finished with status 'done' Step #1: Getting requirements to build wheel: started Step #1: Getting requirements to build wheel: finished with status 'done' Step #1: Preparing wheel metadata: started Step #1: Preparing wheel metadata: finished with status 'done' Step #1: Building wheels for collected packages: numpy Step #1: Building wheel for numpy (PEP 517): started Step #1: Building wheel for numpy (PEP 517): still running... Step #1: Building wheel for numpy (PEP 517): still running... Step #1: Building wheel for numpy (PEP 517): finished with status 'done' Step #1: Created wheel for numpy: filename=numpy-1.24.4-cp38-cp38-linux_x86_64.whl size=9719862 sha256=fc4254644adcb18e3ee21fd7faad18582a5dd703624a82aa0b21bd5cdd875df5 Step #1: Stored in directory: /root/.cache/pip/wheels/9f/b7/f4/38166ec6c7757984ef41e3f6594015395049bff59851c060ae Step #1: Successfully built numpy Step #1: Installing collected packages: numpy Step #1: Successfully installed numpy-1.24.4 Step #1: WARNING: You are using pip version 19.2.3, however version 24.0 is available. Step #1: You should consider upgrading via the 'pip install --upgrade pip' command. Step #1: Removing intermediate container e117d4fe5da1 Step #1: ---> 870b76f1f6f5 Step #1: Step 4/11 : RUN ln -s /usr/local/bin/python3 /usr/local/bin/python Step #1: ---> Running in 6d66440947de Step #1: Removing intermediate container 6d66440947de Step #1: ---> 70d9e1e67af5 Step #1: Step 5/11 : RUN curl -Lo /usr/bin/bazel https://github.com/bazelbuild/bazelisk/releases/download/v1.1.0/bazelisk-linux-amd64 && chmod +x /usr/bin/bazel Step #1: ---> Running in 5f4c7ed683aa Step #1:  % Total % Received % Xferd Average Speed Time Time Time Current Step #1:  Dload Upload Total Spent Left Speed Step #1: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:--  0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Step #1:  100 6036k 100 6036k 0 0 17.2M 0 --:--:-- --:--:-- --:--:-- 17.2M Step #1: Removing intermediate container 5f4c7ed683aa Step #1: ---> 1494de73f421 Step #1: Step 6/11 : ENV JAVA_HOME /usr/lib/jvm/java-15-openjdk-amd64 Step #1: ---> Running in ee882d5406f2 Step #1: Removing intermediate container ee882d5406f2 Step #1: ---> 3b9aa0fda8d8 Step #1: Step 7/11 : RUN install_java.sh || true Step #1: ---> Running in 1f1d46d97f21 Step #1: + cd /tmp Step #1: + curl --silent -L -O https://download.java.net/java/GA/jdk15.0.2/0d1cfde4252546c6931946de8db48ee2/7/GPL/openjdk-15.0.2_linux-x64_bin.tar.gz Step #1: + mkdir -p /usr/lib/jvm/java-15-openjdk-amd64 Step #1: + tar -xz --strip-components=1 -f openjdk-15.0.2_linux-x64_bin.tar.gz --directory /usr/lib/jvm/java-15-openjdk-amd64 Step #1: + rm -f openjdk-15.0.2_linux-x64_bin.tar.gz Step #1: + rm -rf /usr/lib/jvm/java-15-openjdk-amd64/jmods /usr/lib/jvm/java-15-openjdk-amd64/lib/src.zip Step #1: + cd /src/ Step #1: + git clone https://github.com/CodeIntelligenceTesting/jazzer Step #1: Cloning into 'jazzer'... Step #1: + cd jazzer Step #1: + git checkout 96205feebc7135075ffa48aae3f22e38cae5dc45 Step #1: Note: switching to '96205feebc7135075ffa48aae3f22e38cae5dc45'. Step #1: Step #1: You are in 'detached HEAD' state. You can look around, make experimental Step #1: changes and commit them, and you can discard any commits you make in this Step #1: state without impacting any branches by switching back to a branch. Step #1: Step #1: If you want to create a new branch to retain commits you create, you may Step #1: do so (now or later) by using -c with the switch command. Example: Step #1: Step #1: git switch -c Step #1: Step #1: Or undo this operation with: Step #1: Step #1: git switch - Step #1: Step #1: Turn off this advice by setting config variable advice.detachedHead to false Step #1: Step #1: HEAD is now at 96205fee build: update toolchains_llvm dependency Step #1: + cat Step #1: + bazel build //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar //deploy:jazzer-api //launcher:jazzer Step #1: 2024/05/12 06:19:16 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #1: 2024/05/12 06:19:16 Downloading https://storage.googleapis.com/bazel-builds/artifacts/ubuntu1404/1f12a4d8f82efa3eac5e1a708833e8ed53e54327/bazel... Step #1: Extracting Bazel installation... Step #1: Starting local Bazel server and connecting to it... Step #1: Computing main repo mapping: Step #1: Computing main repo mapping: Step #1: Computing main repo mapping: Step #1: Computing main repo mapping: Step #1: DEBUG: /root/.cache/bazel/_bazel_root/e3c2be7f6be7a238950c8073a90fc93c/external/rules_jvm_external/coursier.bzl:445:18: WARNING: rules_jvm_external_deps_install.json contains an outdated input signature. It is recommended that you regenerate it by running either: Step #1: REPIN=1 bazel run @unpinned_rules_jvm_external_deps//:pin Step #1: or: Step #1: 1) Set 'fail_if_repin_required' to 'False' in 'maven_install' Step #1: 2) Run 'bazel run @unpinned_rules_jvm_external_deps//:pin' Step #1: 3) Reset 'fail_if_repin_required' to 'True' in 'maven_install' Step #1: Step #1: Computing main repo mapping: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: 3 targets (3 packages loaded, 0 targets configured) Step #1: Analyzing: 3 targets (3 packages loaded, 0 targets configured) Step #1: [0 / 1] checking cached actions Step #1: Analyzing: 3 targets (49 packages loaded, 10 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (136 packages loaded, 987 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (141 packages loaded, 1267 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 1267 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (142 packages loaded, 8155 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (143 packages loaded, 8203 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (144 packages loaded, 8326 targets configured) Step #1: [1 / 1] checking cached actions Step #1: Analyzing: 3 targets (144 packages loaded, 8326 targets configured) Step #1: [1 / 1] checking cached actions Step #1: INFO: Analyzed 3 targets (154 packages loaded, 10190 targets configured). Step #1: [50 / 360] Extracting interface for jar external/jvm__jarjar_abrams_assembly/jar/downloaded.jar [for tool]; 0s processwrapper-sandbox ... (2 actions, 1 running) Step #1: [53 / 360] Compiling FuzzerUtilLinux.cpp; 0s processwrapper-sandbox ... (31 actions, 30 running) Step #1: [53 / 360] Compiling FuzzerUtilLinux.cpp; 1s processwrapper-sandbox ... (32 actions running) Step #1: [54 / 360] Compiling FuzzerUtilLinux.cpp; 4s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [57 / 360] Compiling FuzzerUtilLinux.cpp; 5s processwrapper-sandbox ... (31 actions, 30 running) Step #1: [60 / 360] Compiling FuzzerUtilLinux.cpp; 6s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [66 / 360] Compiling FuzzerUtilLinux.cpp; 7s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [76 / 360] Compiling FuzzerUtilLinux.cpp; 8s processwrapper-sandbox ... (32 actions, 31 running) Step #1: [88 / 360] Compiling FuzzerUtilLinux.cpp; 9s processwrapper-sandbox ... (30 actions, 29 running) Step #1: [111 / 360] Compiling FuzzerDataFlowTrace.cpp; 10s processwrapper-sandbox ... (30 actions, 29 running) Step #1: [124 / 360] Compiling FuzzerDataFlowTrace.cpp; 11s processwrapper-sandbox ... (32 actions running) Step #1: [134 / 360] Compiling FuzzerDataFlowTrace.cpp; 12s processwrapper-sandbox ... (32 actions, 30 running) Step #1: [145 / 360] Compiling FuzzerDriver.cpp; 13s processwrapper-sandbox ... (31 actions, 30 running) Step #1: [163 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 9s worker ... (31 actions, 30 running) Step #1: [177 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 10s worker ... (30 actions running) Step #1: INFO: From Building external/com_github_jhalterman_typetools/libtypetools.jar (2 source files): Step #1: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:34: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #1: import java.security.AccessController; Step #1: ^ Step #1: external/com_github_jhalterman_typetools/src/main/java/net/jodah/typetools/TypeResolver.java:68: warning: [removal] AccessController in java.security has been deprecated and marked for removal Step #1: final Unsafe unsafe = AccessController.doPrivileged(new PrivilegedExceptionAction() { Step #1: ^ Step #1: [186 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:utils { kt: 1, java: 0, srcjars: 0 } for k8; 11s worker ... (23 actions, 22 running) Step #1: [189 / 360] Building external/jazzer_jacoco/libjacoco_internal_unshaded-class.jar (126 source files); 8s multiplex-worker ... (23 actions, 22 running) Step #1: [193 / 360] Compiling Java headers external/fmeum_rules_jni/jni/tools/native_loader/src/main/java/com/github/fmeum/rules_jni/libnative_library_info-hjar.jar (1 source file); 5s processwrapper-sandbox ... (20 actions, 19 running) Step #1: [202 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 6s worker ... (19 actions running) Step #1: [220 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 7s worker ... (21 actions running) Step #1: [244 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 8s worker ... (12 actions running) Step #1: [269 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/utils:simple_glob_matcher { kt: 1, java: 0, srcjars: 0 } for k8; 9s worker ... (18 actions, 17 running) Step #1: [283 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 4s worker ... (16 actions, 15 running) Step #1: [296 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 5s worker ... (14 actions, 13 running) Step #1: [303 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 6s worker ... (9 actions running) Step #1: [314 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 7s worker ... (7 actions running) Step #1: [326 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 9s worker ... (3 actions running) Step #1: [327 / 360] KotlinCompile //sanitizers/src/main/java/com/code_intelligence/jazzer/sanitizers:sanitizers { kt: 9, java: 0, srcjars: 0 } for k8; 12s worker ... (4 actions, 2 running) Step #1: [332 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 5s worker ... (2 actions running) Step #1: [333 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor { kt: 11, java: 1, srcjars: 0 } for k8; 7s worker ... (2 actions, 1 running) Step #1: [338 / 360] [Prepa] Merging Kotlin output jar //src/main/java/com/code_intelligence/jazzer/instrumentor:instrumentor (Abi) from 2 inputs Step #1: [342 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/agent:agent_lib { kt: 3, java: 1, srcjars: 0 } for k8; 1s worker ... (2 actions running) Step #1: [343 / 360] KotlinCompile //src/main/java/com/code_intelligence/jazzer/agent:agent_lib { kt: 3, java: 1, srcjars: 0 } for k8; 2s worker Step #1: [349 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/agent/libagent_installer-hjar.jar (1 source file); 0s processwrapper-sandbox ... (2 actions running) Step #1: [353 / 360] Compiling Java headers src/main/java/com/code_intelligence/jazzer/driver/libdriver-hjar.jar (1 source file); 0s processwrapper-sandbox ... (2 actions running) Step #1: [357 / 360] jarjar @//src/main/java/com/code_intelligence/jazzer:jazzer_shaded; 1s processwrapper-sandbox Step #1: [358 / 360] [Prepa] Action src/main/java/com/code_intelligence/jazzer/jazzer.jar Step #1: INFO: Found 3 targets... Step #1: INFO: Elapsed time: 182.049s, Critical Path: 38.57s Step #1: INFO: 360 processes: 36 internal, 239 processwrapper-sandbox, 85 worker. Step #1: INFO: Build completed successfully, 360 total actions Step #1: ++ bazel cquery --output=files //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar Step #1: 2024/05/12 06:22:18 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #1: Computing main repo mapping: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //src/main/java/com/code_intelligence/jazzer:jazzer_standalone_deploy.jar (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.389s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: + cp bazel-out/k8-opt/bin/src/main/java/com/code_intelligence/jazzer/jazzer_standalone_deploy.jar /usr/local/bin/jazzer_agent_deploy.jar Step #1: ++ bazel cquery --output=files //launcher:jazzer Step #1: 2024/05/12 06:22:19 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #1: Computing main repo mapping: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //launcher:jazzer (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //launcher:jazzer (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.171s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: + cp bazel-out/k8-opt/bin/launcher/jazzer /usr/local/bin/jazzer_driver Step #1: ++ bazel cquery --output=files //deploy:jazzer-api Step #1: 2024/05/12 06:22:19 Using unreleased version at commit 1f12a4d8f82efa3eac5e1a708833e8ed53e54327 Step #1: Computing main repo mapping: Step #1: Loading: Step #1: Loading: 0 packages loaded Step #1: Analyzing: target //deploy:jazzer-api (0 packages loaded, 0 targets configured) Step #1: INFO: Analyzed target //deploy:jazzer-api (0 packages loaded, 0 targets configured). Step #1: INFO: Found 1 target... Step #1: INFO: Elapsed time: 0.167s, Critical Path: 0.00s Step #1: INFO: 0 processes. Step #1: INFO: Build completed successfully, 0 total actions Step #1: /usr/local/bin/install_java.sh: line 44: JAZZER_API_PATH: unbound variable Step #1: Removing intermediate container 1f1d46d97f21 Step #1: ---> af6ae76499df Step #1: Step 8/11 : RUN git clone --depth 1 https://github.com/tensorflow/tensorflow tensorflow Step #1: ---> Running in 5307cd5ebe43 Step #1: Cloning into 'tensorflow'... Step #1: Updating files: 41% (13029/31677) Updating files: 42% (13305/31677) Updating files: 43% (13622/31677) Updating files: 44% (13938/31677) Updating files: 45% (14255/31677) Updating files: 46% (14572/31677) Updating files: 47% (14889/31677) Updating files: 48% (15205/31677) Updating files: 49% (15522/31677) Updating files: 50% (15839/31677) Updating files: 51% (16156/31677) Updating files: 52% (16473/31677) Updating files: 53% (16789/31677) Updating files: 54% (17106/31677) Updating files: 55% (17423/31677) Updating files: 56% (17740/31677) Updating files: 57% (18056/31677) Updating files: 58% (18373/31677) Updating files: 59% (18690/31677) Updating files: 60% (19007/31677) Updating files: 61% (19323/31677) Updating files: 62% (19640/31677) Updating files: 63% (19957/31677) Updating files: 64% (20274/31677) Updating files: 65% (20591/31677) Updating files: 66% (20907/31677) Updating files: 67% (21224/31677) Updating files: 68% (21541/31677) Updating files: 69% (21858/31677) Updating files: 70% (22174/31677) Updating files: 71% (22491/31677) Updating files: 72% (22808/31677) Updating files: 73% (23125/31677) Updating files: 73% (23428/31677) Updating files: 74% (23441/31677) Updating files: 75% (23758/31677) Updating files: 76% (24075/31677) Updating files: 77% (24392/31677) Updating files: 78% (24709/31677) Updating files: 79% (25025/31677) Updating files: 80% (25342/31677) Updating files: 81% (25659/31677) Updating files: 82% (25976/31677) Updating files: 83% (26292/31677) Updating files: 84% (26609/31677) Updating files: 85% (26926/31677) Updating files: 86% (27243/31677) Updating files: 87% (27559/31677) Updating files: 88% (27876/31677) Updating files: 89% (28193/31677) Updating files: 90% (28510/31677) Updating files: 91% (28827/31677) Updating files: 92% (29143/31677) Updating files: 93% (29460/31677) Updating files: 94% (29777/31677) Updating files: 95% (30094/31677) Updating files: 96% (30410/31677) Updating files: 97% (30727/31677) Updating files: 98% (31044/31677) Updating files: 99% (31361/31677) Updating files: 100% (31677/31677) Updating files: 100% (31677/31677), done. Step #1: Removing intermediate container 5307cd5ebe43 Step #1: ---> 20522c4b0c1c Step #1: Step 9/11 : WORKDIR $SRC/tensorflow Step #1: ---> Running in 1b89b0cd0ea2 Step #1: Removing intermediate container 1b89b0cd0ea2 Step #1: ---> 61193e54fa23 Step #1: Step 10/11 : COPY build.sh $SRC/ Step #1: ---> c411459ef563 Step #1: Step 11/11 : COPY *.patch $SRC/ Step #1: ---> fbf6546637f5 Step #1: Successfully built fbf6546637f5 Step #1: Successfully tagged gcr.io/oss-fuzz/tensorflow:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/tensorflow Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filekQKgML Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/tensorflow/.git Step #2 - "srcmap": + GIT_DIR=/src/tensorflow Step #2 - "srcmap": + cd /src/tensorflow Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/tensorflow/tensorflow Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=aa3247a2388f9ba27b21d131479edc078c34942a Step #2 - "srcmap": + jq_inplace /tmp/filekQKgML '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "aa3247a2388f9ba27b21d131479edc078c34942a" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filepIOnGa Step #2 - "srcmap": + cat /tmp/filekQKgML Step #2 - "srcmap": + jq '."/src/tensorflow" = { type: "git", url: "https://github.com/tensorflow/tensorflow", rev: "aa3247a2388f9ba27b21d131479edc078c34942a" }' Step #2 - "srcmap": + mv /tmp/filepIOnGa /tmp/filekQKgML Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/jazzer/.git Step #2 - "srcmap": + GIT_DIR=/src/jazzer Step #2 - "srcmap": + cd /src/jazzer Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/CodeIntelligenceTesting/jazzer Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=96205feebc7135075ffa48aae3f22e38cae5dc45 Step #2 - "srcmap": + jq_inplace /tmp/filekQKgML '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "96205feebc7135075ffa48aae3f22e38cae5dc45" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileNU3odG Step #2 - "srcmap": + cat /tmp/filekQKgML Step #2 - "srcmap": + jq '."/src/jazzer" = { type: "git", url: "https://github.com/CodeIntelligenceTesting/jazzer", rev: "96205feebc7135075ffa48aae3f22e38cae5dc45" }' Step #2 - "srcmap": + mv /tmp/fileNU3odG /tmp/filekQKgML Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filekQKgML Step #2 - "srcmap": + rm /tmp/filekQKgML Step #2 - "srcmap": { Step #2 - "srcmap": "/src/tensorflow": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/tensorflow/tensorflow", Step #2 - "srcmap": "rev": "aa3247a2388f9ba27b21d131479edc078c34942a" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/jazzer": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/CodeIntelligenceTesting/jazzer", Step #2 - "srcmap": "rev": "96205feebc7135075ffa48aae3f22e38cae5dc45" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + git apply --ignore-space-change --ignore-whitespace /src/fuzz_patch.patch Step #3 - "compile-libfuzzer-address-x86_64": error: patch failed: tensorflow/security/fuzzing/cc/BUILD:55 Step #3 - "compile-libfuzzer-address-x86_64": error: tensorflow/security/fuzzing/cc/BUILD: patch does not apply Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image tensorflow Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 tensorflow Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1