starting build "c77b0d97-d137-46fc-8634-58c137db9742" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: dd0bbb17640b: Pulling fs layer Step #1: 62275a527176: Pulling fs layer Step #1: 111633040162: Pulling fs layer Step #1: 5bf7dd58428c: Pulling fs layer Step #1: 632c9b314f45: Pulling fs layer Step #1: 8ae501891266: Pulling fs layer Step #1: 3058f8e90c86: Pulling fs layer Step #1: c377fa4fb781: Pulling fs layer Step #1: 2336eb300fb9: Pulling fs layer Step #1: 09429854c898: Pulling fs layer Step #1: 71af8faf61ed: Pulling fs layer Step #1: 687fd097ee80: Pulling fs layer Step #1: 7f1e63401161: Pulling fs layer Step #1: cf8b5802c762: Pulling fs layer Step #1: 0e6dab0925eb: Pulling fs layer Step #1: f4bced45a7b2: Pulling fs layer Step #1: 2707ad88823d: Pulling fs layer Step #1: 5bf7dd58428c: Waiting Step #1: af6705528e9c: Pulling fs layer Step #1: 4e1005e0a6aa: Pulling fs layer Step #1: 632c9b314f45: Waiting Step #1: 8ae501891266: Waiting Step #1: 118105242bd8: Pulling fs layer Step #1: 2aa39f787b87: Pulling fs layer Step #1: d3f87be3762e: Pulling fs layer Step #1: 6fd806021fc2: Pulling fs layer Step #1: 9d856dc172cd: Pulling fs layer Step #1: 3058f8e90c86: Waiting Step #1: a987fc666fa1: Pulling fs layer Step #1: 233e05621483: Pulling fs layer Step #1: c377fa4fb781: Waiting Step #1: 0d3facbb2d8c: Pulling fs layer Step #1: aa9066b95eb6: Pulling fs layer Step #1: 2336eb300fb9: Waiting Step #1: ff11ed875e6f: Pulling fs layer Step #1: 0e6dab0925eb: Waiting Step #1: 33f6a6d38c7e: Pulling fs layer Step #1: 7f1e63401161: Waiting Step #1: 5ecd2cf410de: Pulling fs layer Step #1: 702a45c3ae33: Pulling fs layer Step #1: f4bced45a7b2: Waiting Step #1: cf8b5802c762: Waiting Step #1: df6fed191aed: Pulling fs layer Step #1: 09429854c898: Waiting Step #1: 2707ad88823d: Waiting Step #1: af6705528e9c: Waiting Step #1: 71af8faf61ed: Waiting Step #1: 118105242bd8: Waiting Step #1: 4e1005e0a6aa: Waiting Step #1: 687fd097ee80: Waiting Step #1: 2aa39f787b87: Waiting Step #1: 5ecd2cf410de: Waiting Step #1: aa9066b95eb6: Waiting Step #1: 702a45c3ae33: Waiting Step #1: d3f87be3762e: Waiting Step #1: 6fd806021fc2: Waiting Step #1: ff11ed875e6f: Waiting Step #1: df6fed191aed: Waiting Step #1: 9d856dc172cd: Waiting Step #1: 33f6a6d38c7e: Waiting Step #1: a987fc666fa1: Waiting Step #1: 0d3facbb2d8c: Waiting Step #1: 233e05621483: Waiting Step #1: 62275a527176: Verifying Checksum Step #1: 62275a527176: Download complete Step #1: b549f31133a9: Download complete Step #1: 5bf7dd58428c: Verifying Checksum Step #1: 5bf7dd58428c: Download complete Step #1: 111633040162: Verifying Checksum Step #1: 111633040162: Download complete Step #1: 632c9b314f45: Verifying Checksum Step #1: 632c9b314f45: Download complete Step #1: 3058f8e90c86: Download complete Step #1: dd0bbb17640b: Verifying Checksum Step #1: dd0bbb17640b: Download complete Step #1: c377fa4fb781: Verifying Checksum Step #1: c377fa4fb781: Download complete Step #1: b549f31133a9: Pull complete Step #1: 09429854c898: Verifying Checksum Step #1: 09429854c898: Download complete Step #1: 71af8faf61ed: Verifying Checksum Step #1: 71af8faf61ed: Download complete Step #1: 687fd097ee80: Verifying Checksum Step #1: 687fd097ee80: Download complete Step #1: 7f1e63401161: Verifying Checksum Step #1: 7f1e63401161: Download complete Step #1: cf8b5802c762: Verifying Checksum Step #1: cf8b5802c762: Download complete Step #1: 0e6dab0925eb: Verifying Checksum Step #1: 0e6dab0925eb: Download complete Step #1: 2336eb300fb9: Verifying Checksum Step #1: 2336eb300fb9: Download complete Step #1: f4bced45a7b2: Verifying Checksum Step #1: f4bced45a7b2: Download complete Step #1: af6705528e9c: Download complete Step #1: 2707ad88823d: Verifying Checksum Step #1: 2707ad88823d: Download complete Step #1: 4e1005e0a6aa: Verifying Checksum Step #1: 4e1005e0a6aa: Download complete Step #1: 118105242bd8: Verifying Checksum Step #1: 118105242bd8: Download complete Step #1: 2aa39f787b87: Verifying Checksum Step #1: 2aa39f787b87: Download complete Step #1: 8ae501891266: Verifying Checksum Step #1: 8ae501891266: Download complete Step #1: 6fd806021fc2: Download complete Step #1: d3f87be3762e: Verifying Checksum Step #1: d3f87be3762e: Download complete Step #1: 9d856dc172cd: Download complete Step #1: a987fc666fa1: Verifying Checksum Step #1: a987fc666fa1: Download complete Step #1: 233e05621483: Verifying Checksum Step #1: 233e05621483: Download complete Step #1: 0d3facbb2d8c: Verifying Checksum Step #1: 0d3facbb2d8c: Download complete Step #1: aa9066b95eb6: Verifying Checksum Step #1: aa9066b95eb6: Download complete Step #1: 33f6a6d38c7e: Download complete Step #1: ff11ed875e6f: Verifying Checksum Step #1: ff11ed875e6f: Download complete Step #1: 5ecd2cf410de: Download complete Step #1: 702a45c3ae33: Verifying Checksum Step #1: 702a45c3ae33: Download complete Step #1: df6fed191aed: Verifying Checksum Step #1: df6fed191aed: Download complete Step #1: dd0bbb17640b: Pull complete Step #1: 62275a527176: Pull complete Step #1: 111633040162: Pull complete Step #1: 5bf7dd58428c: Pull complete Step #1: 632c9b314f45: Pull complete Step #1: 8ae501891266: Pull complete Step #1: 3058f8e90c86: Pull complete Step #1: c377fa4fb781: Pull complete Step #1: 2336eb300fb9: Pull complete Step #1: 09429854c898: Pull complete Step #1: 71af8faf61ed: Pull complete Step #1: 687fd097ee80: Pull complete Step #1: 7f1e63401161: Pull complete Step #1: cf8b5802c762: Pull complete Step #1: 0e6dab0925eb: Pull complete Step #1: f4bced45a7b2: Pull complete Step #1: 2707ad88823d: Pull complete Step #1: af6705528e9c: Pull complete Step #1: 4e1005e0a6aa: Pull complete Step #1: 118105242bd8: Pull complete Step #1: 2aa39f787b87: Pull complete Step #1: d3f87be3762e: Pull complete Step #1: 6fd806021fc2: Pull complete Step #1: 9d856dc172cd: Pull complete Step #1: a987fc666fa1: Pull complete Step #1: 233e05621483: Pull complete Step #1: 0d3facbb2d8c: Pull complete Step #1: aa9066b95eb6: Pull complete Step #1: ff11ed875e6f: Pull complete Step #1: 33f6a6d38c7e: Pull complete Step #1: 5ecd2cf410de: Pull complete Step #1: 702a45c3ae33: Pull complete Step #1: df6fed191aed: Pull complete Step #1: Digest: sha256:c14f2415c900600181b57d8093e730eca5852792378c243bf284a9be0b760f40 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> e17bfed5df09 Step #1: Step 2/5 : RUN apt-get update && apt-get install -y cmake Step #1: ---> Running in 391a16e2a248 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Get:4 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Fetched 383 kB in 1s (720 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: Suggested packages: Step #1: cmake-doc ninja-build lrzip Step #1: The following NEW packages will be installed: Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2 Step #1: 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 15.0 MB of archives. Step #1: After this operation, 65.0 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.4 [327 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 15.0 MB in 1s (29.9 MB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package libuv1:amd64. Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Selecting previously unselected package cmake-data. Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Selecting previously unselected package libarchive13:amd64. Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.4_amd64.deb ... Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Selecting previously unselected package libjsoncpp1:amd64. Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Selecting previously unselected package librhash0:amd64. Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ... Step #1: Unpacking librhash0:amd64 (1.3.9-1) ... Step #1: Selecting previously unselected package cmake. Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1: Setting up librhash0:amd64 (1.3.9-1) ... Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.4) ... Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 391a16e2a248 Step #1: ---> b429cf485de9 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/DaveGamble/cJSON.git cjson Step #1: ---> Running in e278fceb40ea Step #1: Cloning into 'cjson'... Step #1: Removing intermediate container e278fceb40ea Step #1: ---> f5f3137b8fc2 Step #1: Step 4/5 : WORKDIR cjson Step #1: ---> Running in 14fb81b2eb33 Step #1: Removing intermediate container 14fb81b2eb33 Step #1: ---> bb04ee175fe3 Step #1: Step 5/5 : COPY build.sh $SRC/ Step #1: ---> 9b560e76ef41 Step #1: Successfully built 9b560e76ef41 Step #1: Successfully tagged gcr.io/oss-fuzz/cjson:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/cjson Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filexg2RRN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cjson/.git Step #2 - "srcmap": + GIT_DIR=/src/cjson Step #2 - "srcmap": + cd /src/cjson Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/DaveGamble/cJSON.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=12c4bf1986c288950a3d06da757109a6aa1ece38 Step #2 - "srcmap": + jq_inplace /tmp/filexg2RRN '."/src/cjson" = { type: "git", url: "https://github.com/DaveGamble/cJSON.git", rev: "12c4bf1986c288950a3d06da757109a6aa1ece38" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file9R5kfa Step #2 - "srcmap": + cat /tmp/filexg2RRN Step #2 - "srcmap": + jq '."/src/cjson" = { type: "git", url: "https://github.com/DaveGamble/cJSON.git", rev: "12c4bf1986c288950a3d06da757109a6aa1ece38" }' Step #2 - "srcmap": + mv /tmp/file9R5kfa /tmp/filexg2RRN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filexg2RRN Step #2 - "srcmap": + rm /tmp/filexg2RRN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cjson": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/DaveGamble/cJSON.git", Step #2 - "srcmap": "rev": "12c4bf1986c288950a3d06da757109a6aa1ece38" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cjson/fuzzing/ossfuzz.sh Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Deprecation Warning at CMakeLists.txt:2 (cmake_minimum_required): Step #3 - "compile-libfuzzer-coverage-x86_64": Compatibility with CMake < 3.5 will be removed from a future version of Step #3 - "compile-libfuzzer-coverage-x86_64": CMake. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Update the VERSION argument value or use a ... suffix to tell Step #3 - "compile-libfuzzer-coverage-x86_64": CMake that the project does not need compatibility with older versions. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_stdc89 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_stdc89 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_pedantic Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_pedantic - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wall Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wall - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wextra Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wextra - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Werror Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Werror - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wstrictprototypes Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wstrictprototypes - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wwritestrings Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wwritestrings - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wshadow Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wshadow - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Winitself Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Winitself - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcastalign Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcastalign - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wformat2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wformat2 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wmissingprototypes Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wmissingprototypes - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wstrictoverflow2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wstrictoverflow2 - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcastqual Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcastqual - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wundef Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wundef - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wswitchdefault Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wswitchdefault - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wconversion Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wconversion - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wccompat Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wccompat - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_fstackprotectorstrong Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_fstackprotectorstrong - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcomma Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wcomma - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wdoublepromotion Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wdoublepromotion - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wparentheses Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wparentheses - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wformatoverflow Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wformatoverflow - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wunusedmacros Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wunusedmacros - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wmissingvariabledeclarations Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wmissingvariabledeclarations - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wusedbutmarkedunused Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wusedbutmarkedunused - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wswitchenum Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_Wswitchenum - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_fvisibilityhidden Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test FLAG_SUPPORTED_fvisibilityhidden - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (2.2s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/cjson/build Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building C object CMakeFiles/cjson.dir/cJSON.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C static library libcjson.a Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target cjson Step #3 - "compile-libfuzzer-coverage-x86_64": clang++: warning: treating 'c' input as 'c++' when in C++ mode, this behavior is deprecated [-Wdeprecated] Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/ (stored 0%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test6 (deflated 43%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test3.bu (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test3.uu (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test7 (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test3 (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test8 (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test9 (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test5 (deflated 71%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test4 (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test10 (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test2 (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test11 (deflated 20%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test1 (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/cjson/fuzzing/inputs/test3.uf (deflated 57%) Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: dd0bbb17640b: Already exists Step #4: 62275a527176: Already exists Step #4: 5fd16084d27b: Pulling fs layer Step #4: 3b4a256e94e2: Pulling fs layer Step #4: 1193775e083f: Pulling fs layer Step #4: f727a9982adf: Pulling fs layer Step #4: f8d818a221e1: Pulling fs layer Step #4: b9c799c7d67c: Pulling fs layer Step #4: 2591e08b7318: Pulling fs layer Step #4: bce2b20ed137: Pulling fs layer Step #4: aa6e1a4c641d: Pulling fs layer Step #4: b2d84ef78605: Pulling fs layer Step #4: 51141030c98b: Pulling fs layer Step #4: 1352417c166b: Pulling fs layer Step #4: 3e559a118ced: Pulling fs layer Step #4: 5ee64ebc3e2d: Pulling fs layer Step #4: b8fbef88b43f: Pulling fs layer Step #4: bca5011b5d98: Pulling fs layer Step #4: 4e6d480500bd: Pulling fs layer Step #4: 5bf153eb29f2: Pulling fs layer Step #4: e5dd31db85a2: Pulling fs layer Step #4: 1dc362db725d: Pulling fs layer Step #4: 323475a2805d: Pulling fs layer Step #4: 9746f385c510: Pulling fs layer Step #4: 0bf176c5c5f0: Pulling fs layer Step #4: aa6e1a4c641d: Waiting Step #4: b8fbef88b43f: Waiting Step #4: e5dd31db85a2: Waiting Step #4: b2d84ef78605: Waiting Step #4: bca5011b5d98: Waiting Step #4: 1dc362db725d: Waiting Step #4: 51141030c98b: Waiting Step #4: 1352417c166b: Waiting Step #4: 4e6d480500bd: Waiting Step #4: 3e559a118ced: Waiting Step #4: 5bf153eb29f2: Waiting Step #4: 5ee64ebc3e2d: Waiting Step #4: 323475a2805d: Waiting Step #4: 9746f385c510: Waiting Step #4: b9c799c7d67c: Waiting Step #4: bce2b20ed137: Waiting Step #4: 2591e08b7318: Waiting Step #4: 1193775e083f: Verifying Checksum Step #4: 1193775e083f: Download complete Step #4: 5fd16084d27b: Verifying Checksum Step #4: 5fd16084d27b: Download complete Step #4: 3b4a256e94e2: Verifying Checksum Step #4: 3b4a256e94e2: Download complete Step #4: f8d818a221e1: Verifying Checksum Step #4: f8d818a221e1: Download complete Step #4: 5fd16084d27b: Pull complete Step #4: f727a9982adf: Verifying Checksum Step #4: f727a9982adf: Download complete Step #4: 2591e08b7318: Verifying Checksum Step #4: 2591e08b7318: Download complete Step #4: bce2b20ed137: Download complete Step #4: 3b4a256e94e2: Pull complete Step #4: aa6e1a4c641d: Verifying Checksum Step #4: aa6e1a4c641d: Download complete Step #4: 1193775e083f: Pull complete Step #4: b9c799c7d67c: Download complete Step #4: 1352417c166b: Verifying Checksum Step #4: 1352417c166b: Download complete Step #4: 51141030c98b: Verifying Checksum Step #4: 51141030c98b: Download complete Step #4: f727a9982adf: Pull complete Step #4: 3e559a118ced: Verifying Checksum Step #4: f8d818a221e1: Pull complete Step #4: b8fbef88b43f: Download complete Step #4: b2d84ef78605: Verifying Checksum Step #4: b2d84ef78605: Download complete Step #4: 5ee64ebc3e2d: Verifying Checksum Step #4: 5ee64ebc3e2d: Download complete Step #4: 4e6d480500bd: Verifying Checksum Step #4: 4e6d480500bd: Download complete Step #4: 5bf153eb29f2: Verifying Checksum Step #4: 5bf153eb29f2: Download complete Step #4: 1dc362db725d: Verifying Checksum Step #4: 1dc362db725d: Download complete Step #4: e5dd31db85a2: Verifying Checksum Step #4: e5dd31db85a2: Download complete Step #4: b9c799c7d67c: Pull complete Step #4: 323475a2805d: Verifying Checksum Step #4: 323475a2805d: Download complete Step #4: 2591e08b7318: Pull complete Step #4: 9746f385c510: Download complete Step #4: 0bf176c5c5f0: Verifying Checksum Step #4: 0bf176c5c5f0: Download complete Step #4: bca5011b5d98: Verifying Checksum Step #4: bca5011b5d98: Download complete Step #4: bce2b20ed137: Pull complete Step #4: aa6e1a4c641d: Pull complete Step #4: b2d84ef78605: Pull complete Step #4: 51141030c98b: Pull complete Step #4: 1352417c166b: Pull complete Step #4: 3e559a118ced: Pull complete Step #4: 5ee64ebc3e2d: Pull complete Step #4: b8fbef88b43f: Pull complete Step #4: bca5011b5d98: Pull complete Step #4: 4e6d480500bd: Pull complete Step #4: 5bf153eb29f2: Pull complete Step #4: e5dd31db85a2: Pull complete Step #4: 1dc362db725d: Pull complete Step #4: 323475a2805d: Pull complete Step #4: 9746f385c510: Pull complete Step #4: 0bf176c5c5f0: Pull complete Step #4: Digest: sha256:0f990cc1311f94fde83d4a8a4c39464ca2bb422b54915be66a43e132a6eab309 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/cjson_read_fuzzer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/cjson_read_fuzzer.zip or Step #5: /corpus/cjson_read_fuzzer.zip.zip, and cannot find /corpus/cjson_read_fuzzer.zip.ZIP, period. Step #5: Failed to unpack the corpus for cjson_read_fuzzer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image cjson Step #5: python infra/helper.py build_fuzzers --sanitizer coverage cjson Step #5: python infra/helper.py coverage cjson Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1