starting build "d8d89726-85a1-4e01-a54a-b1b540b42877" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 9.216kB Step #1: Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 27a60affb188: Pulling fs layer Step #1: fe996ae7dc59: Pulling fs layer Step #1: 87e0e48e0cd6: Pulling fs layer Step #1: f835b9e0cf1c: Pulling fs layer Step #1: af789c137254: Pulling fs layer Step #1: aff0ac00717e: Pulling fs layer Step #1: 3b1039f9896d: Pulling fs layer Step #1: 03589768b946: Pulling fs layer Step #1: 476467ef4fc6: Pulling fs layer Step #1: 3c766dd49ffb: Pulling fs layer Step #1: cfbfe91f834e: Pulling fs layer Step #1: 0b187dafa8d3: Pulling fs layer Step #1: 345ac71c4767: Pulling fs layer Step #1: 7eadecc7791c: Pulling fs layer Step #1: dde9b3807101: Pulling fs layer Step #1: aa322f9d5179: Pulling fs layer Step #1: ed7ec7eeb8fb: Pulling fs layer Step #1: fcd3b4f5fe45: Pulling fs layer Step #1: 88e3f27d7c68: Pulling fs layer Step #1: 84249ace8dd9: Pulling fs layer Step #1: b48628b9660b: Pulling fs layer Step #1: 560589aab225: Pulling fs layer Step #1: 8049d1ac7afb: Pulling fs layer Step #1: 9ca13435c3d5: Pulling fs layer Step #1: bdf125cfc8ec: Pulling fs layer Step #1: 479b0a7911fe: Pulling fs layer Step #1: b33bd0575475: Pulling fs layer Step #1: 58dcb60388c1: Pulling fs layer Step #1: b8e63fb00ce7: Pulling fs layer Step #1: d8ea79b21b9a: Pulling fs layer Step #1: 74524f23875e: Pulling fs layer Step #1: 8a3a946d5a7c: Pulling fs layer Step #1: 8328a6d3718e: Pulling fs layer Step #1: f835b9e0cf1c: Waiting Step #1: 0b187dafa8d3: Waiting Step #1: fcd3b4f5fe45: Waiting Step #1: af789c137254: Waiting Step #1: 345ac71c4767: Waiting Step #1: 88e3f27d7c68: Waiting Step #1: 476467ef4fc6: Waiting Step #1: 7eadecc7791c: Waiting Step #1: 84249ace8dd9: Waiting Step #1: aff0ac00717e: Waiting Step #1: b48628b9660b: Waiting Step #1: dde9b3807101: Waiting Step #1: 3b1039f9896d: Waiting Step #1: 3c766dd49ffb: Waiting Step #1: 560589aab225: Waiting Step #1: aa322f9d5179: Waiting Step #1: 03589768b946: Waiting Step #1: 8049d1ac7afb: Waiting Step #1: cfbfe91f834e: Waiting Step #1: ed7ec7eeb8fb: Waiting Step #1: d8ea79b21b9a: Waiting Step #1: 87e0e48e0cd6: Waiting Step #1: 74524f23875e: Waiting Step #1: 8328a6d3718e: Waiting Step #1: 9ca13435c3d5: Waiting Step #1: 8a3a946d5a7c: Waiting Step #1: bdf125cfc8ec: Waiting Step #1: 479b0a7911fe: Waiting Step #1: b33bd0575475: Waiting Step #1: 58dcb60388c1: Waiting Step #1: fe996ae7dc59: Verifying Checksum Step #1: fe996ae7dc59: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 87e0e48e0cd6: Verifying Checksum Step #1: 87e0e48e0cd6: Download complete Step #1: f835b9e0cf1c: Verifying Checksum Step #1: f835b9e0cf1c: Download complete Step #1: af789c137254: Download complete Step #1: 3b1039f9896d: Verifying Checksum Step #1: 3b1039f9896d: Download complete Step #1: 27a60affb188: Verifying Checksum Step #1: 27a60affb188: Download complete Step #1: 03589768b946: Verifying Checksum Step #1: 03589768b946: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3c766dd49ffb: Verifying Checksum Step #1: 3c766dd49ffb: Download complete Step #1: cfbfe91f834e: Verifying Checksum Step #1: cfbfe91f834e: Download complete Step #1: 0b187dafa8d3: Download complete Step #1: 345ac71c4767: Verifying Checksum Step #1: 345ac71c4767: Download complete Step #1: 7eadecc7791c: Verifying Checksum Step #1: 7eadecc7791c: Download complete Step #1: dde9b3807101: Verifying Checksum Step #1: dde9b3807101: Download complete Step #1: 476467ef4fc6: Verifying Checksum Step #1: 476467ef4fc6: Download complete Step #1: aa322f9d5179: Verifying Checksum Step #1: aa322f9d5179: Download complete Step #1: ed7ec7eeb8fb: Verifying Checksum Step #1: ed7ec7eeb8fb: Download complete Step #1: 88e3f27d7c68: Verifying Checksum Step #1: 88e3f27d7c68: Download complete Step #1: fcd3b4f5fe45: Verifying Checksum Step #1: fcd3b4f5fe45: Download complete Step #1: b48628b9660b: Download complete Step #1: 84249ace8dd9: Verifying Checksum Step #1: 84249ace8dd9: Download complete Step #1: 8049d1ac7afb: Download complete Step #1: 560589aab225: Verifying Checksum Step #1: 560589aab225: Download complete Step #1: 9ca13435c3d5: Verifying Checksum Step #1: 9ca13435c3d5: Download complete Step #1: aff0ac00717e: Verifying Checksum Step #1: aff0ac00717e: Download complete Step #1: bdf125cfc8ec: Verifying Checksum Step #1: bdf125cfc8ec: Download complete Step #1: 479b0a7911fe: Verifying Checksum Step #1: 479b0a7911fe: Download complete Step #1: b33bd0575475: Verifying Checksum Step #1: b33bd0575475: Download complete Step #1: 58dcb60388c1: Verifying Checksum Step #1: 58dcb60388c1: Download complete Step #1: d8ea79b21b9a: Verifying Checksum Step #1: d8ea79b21b9a: Download complete Step #1: b8e63fb00ce7: Verifying Checksum Step #1: b8e63fb00ce7: Download complete Step #1: 74524f23875e: Verifying Checksum Step #1: 74524f23875e: Download complete Step #1: 8a3a946d5a7c: Verifying Checksum Step #1: 8a3a946d5a7c: Download complete Step #1: 8328a6d3718e: Verifying Checksum Step #1: 8328a6d3718e: Download complete Step #1: 27a60affb188: Pull complete Step #1: fe996ae7dc59: Pull complete Step #1: 87e0e48e0cd6: Pull complete Step #1: f835b9e0cf1c: Pull complete Step #1: af789c137254: Pull complete Step #1: aff0ac00717e: Pull complete Step #1: 3b1039f9896d: Pull complete Step #1: 03589768b946: Pull complete Step #1: 476467ef4fc6: Pull complete Step #1: 3c766dd49ffb: Pull complete Step #1: cfbfe91f834e: Pull complete Step #1: 0b187dafa8d3: Pull complete Step #1: 345ac71c4767: Pull complete Step #1: 7eadecc7791c: Pull complete Step #1: dde9b3807101: Pull complete Step #1: aa322f9d5179: Pull complete Step #1: ed7ec7eeb8fb: Pull complete Step #1: fcd3b4f5fe45: Pull complete Step #1: 88e3f27d7c68: Pull complete Step #1: 84249ace8dd9: Pull complete Step #1: b48628b9660b: Pull complete Step #1: 560589aab225: Pull complete Step #1: 8049d1ac7afb: Pull complete Step #1: 9ca13435c3d5: Pull complete Step #1: bdf125cfc8ec: Pull complete Step #1: 479b0a7911fe: Pull complete Step #1: b33bd0575475: Pull complete Step #1: 58dcb60388c1: Pull complete Step #1: b8e63fb00ce7: Pull complete Step #1: d8ea79b21b9a: Pull complete Step #1: 74524f23875e: Pull complete Step #1: 8a3a946d5a7c: Pull complete Step #1: 8328a6d3718e: Pull complete Step #1: Digest: sha256:112a54785eaf7e70ca82ab22a35e45df51227f5bb0e5125fcc05f446fa324a7e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> fec8bbbf3c13 Step #1: Step 2/9 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Already exists Step #1: 27a60affb188: Already exists Step #1: fe996ae7dc59: Already exists Step #1: 87e0e48e0cd6: Already exists Step #1: f835b9e0cf1c: Already exists Step #1: af789c137254: Already exists Step #1: aff0ac00717e: Already exists Step #1: 3b1039f9896d: Already exists Step #1: 03589768b946: Already exists Step #1: 476467ef4fc6: Already exists Step #1: 3c766dd49ffb: Already exists Step #1: cfbfe91f834e: Already exists Step #1: 0b187dafa8d3: Already exists Step #1: 345ac71c4767: Already exists Step #1: 7eadecc7791c: Already exists Step #1: dde9b3807101: Already exists Step #1: aa322f9d5179: Already exists Step #1: ed7ec7eeb8fb: Already exists Step #1: fcd3b4f5fe45: Already exists Step #1: 88e3f27d7c68: Already exists Step #1: 84249ace8dd9: Already exists Step #1: b48628b9660b: Already exists Step #1: 560589aab225: Already exists Step #1: 8049d1ac7afb: Already exists Step #1: 9ca13435c3d5: Already exists Step #1: bdf125cfc8ec: Already exists Step #1: 479b0a7911fe: Already exists Step #1: b33bd0575475: Already exists Step #1: 58dcb60388c1: Already exists Step #1: b8e63fb00ce7: Already exists Step #1: d8ea79b21b9a: Already exists Step #1: 74524f23875e: Already exists Step #1: 8a3a946d5a7c: Already exists Step #1: 8328a6d3718e: Already exists Step #1: 5cf1d6e2f591: Pulling fs layer Step #1: 1c535dcf659d: Pulling fs layer Step #1: f611436a7c2a: Pulling fs layer Step #1: 5cf1d6e2f591: Verifying Checksum Step #1: 5cf1d6e2f591: Download complete Step #1: f611436a7c2a: Download complete Step #1: 5cf1d6e2f591: Pull complete Step #1: 1c535dcf659d: Verifying Checksum Step #1: 1c535dcf659d: Download complete Step #1: 1c535dcf659d: Pull complete Step #1: f611436a7c2a: Pull complete Step #1: Digest: sha256:fc82f871f962d86d3eaf641af959105188b030d2ba7cd522610ff2629fa62281 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 199904efe5ba Step #1: Step 3/9 : RUN apt-get update && apt-get install -y make pkg-config Step #1: ---> Running in 0eed27b25329 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Fetched 383 kB in 1s (378 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: libglib2.0-0 libglib2.0-data libicu66 libxml2 shared-mime-info xdg-user-dirs Step #1: The following NEW packages will be installed: Step #1: libglib2.0-0 libglib2.0-data libicu66 libxml2 pkg-config shared-mime-info Step #1: xdg-user-dirs Step #1: 0 upgraded, 7 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 11.0 MB of archives. Step #1: After this operation, 43.2 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.8 [5848 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.8 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 11.0 MB in 0s (22.6 MB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../0-libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../1-libglib2.0-data_2.64.6-1~ubuntu20.04.8_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../2-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../3-libxml2_2.9.10+dfsg-5ubuntu0.20.04.8_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.8) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../4-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../5-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../6-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.8) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.17) ... Step #1: Removing intermediate container 0eed27b25329 Step #1: ---> 5b203cdfea5e Step #1: Step 4/9 : RUN git clone --depth 1 https://github.com/google/tink Step #1: ---> Running in f6183b425f47 Step #1: Cloning into 'tink'... Step #1: Removing intermediate container f6183b425f47 Step #1: ---> c1826c733d1b Step #1: Step 5/9 : RUN mkdir $SRC/tink/cc/fuzzing Step #1: ---> Running in f4902eaa377b Step #1: Removing intermediate container f4902eaa377b Step #1: ---> b1fb3ebe279e Step #1: Step 6/9 : COPY fuzzing_CMake $SRC/tink/cc/fuzzing/CMakeLists.txt Step #1: ---> c35dd48c35c7 Step #1: Step 7/9 : COPY tink_encrypt_decrypt_fuzzer.cc $SRC/tink/cc/fuzzing/tink_encrypt_decrypt_fuzzer.cc Step #1: ---> 2c3ce89fcc0b Step #1: Step 8/9 : COPY build.sh $SRC/ Step #1: ---> 7cb506af71a1 Step #1: Step 9/9 : WORKDIR tink Step #1: ---> Running in f7e120692fcb Step #1: Removing intermediate container f7e120692fcb Step #1: ---> 92704e037baa Step #1: Successfully built 92704e037baa Step #1: Successfully tagged gcr.io/oss-fuzz/tink:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/tink Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileOPKl4N Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/tink/.git Step #2 - "srcmap": + GIT_DIR=/src/tink Step #2 - "srcmap": + cd /src/tink Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/tink Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=1f4cd38874ec0be85f5aa55ba86d95d18c3fd965 Step #2 - "srcmap": + jq_inplace /tmp/fileOPKl4N '."/src/tink" = { type: "git", url: "https://github.com/google/tink", rev: "1f4cd38874ec0be85f5aa55ba86d95d18c3fd965" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevI0ixd Step #2 - "srcmap": + cat /tmp/fileOPKl4N Step #2 - "srcmap": + jq '."/src/tink" = { type: "git", url: "https://github.com/google/tink", rev: "1f4cd38874ec0be85f5aa55ba86d95d18c3fd965" }' Step #2 - "srcmap": + mv /tmp/filevI0ixd /tmp/fileOPKl4N Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileOPKl4N Step #2 - "srcmap": + rm /tmp/fileOPKl4N Step #2 - "srcmap": { Step #2 - "srcmap": "/src/tink": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/tink", Step #2 - "srcmap": "rev": "1f4cd38874ec0be85f5aa55ba86d95d18c3fd965" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd cc/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake . Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning (dev) at /usr/local/share/cmake-3.29/Modules/FetchContent.cmake:1352 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": The DOWNLOAD_EXTRACT_TIMESTAMP option was not given and policy CMP0135 is Step #3 - "compile-libfuzzer-coverage-x86_64": not set. The policy's OLD behavior will be used. When using a URL Step #3 - "compile-libfuzzer-coverage-x86_64": download, the timestamps of extracted files should preferably be that of Step #3 - "compile-libfuzzer-coverage-x86_64": the time of extraction, otherwise code that depends on the extracted Step #3 - "compile-libfuzzer-coverage-x86_64": contents might not be rebuilt if the URL changes. The OLD behavior Step #3 - "compile-libfuzzer-coverage-x86_64": preserves the timestamps from the archive instead, but this is usually not Step #3 - "compile-libfuzzer-coverage-x86_64": what you want. Update your project to the NEW behavior or specify the Step #3 - "compile-libfuzzer-coverage-x86_64": DOWNLOAD_EXTRACT_TIMESTAMP option with a value of true to avoid this Step #3 - "compile-libfuzzer-coverage-x86_64": robustness issue. Step #3 - "compile-libfuzzer-coverage-x86_64": Call Stack (most recent call first): Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/cmake/HttpArchive.cmake:50 (FetchContent_Declare) Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/cmake/TinkWorkspace.cmake:83 (http_archive) Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/CMakeLists.txt:17 (include) Step #3 - "compile-libfuzzer-coverage-x86_64": This warning is for project developers. Use -Wno-dev to suppress it. Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Fetching abseil Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Creating directories for 'abseil-populate' Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Performing download step (download, verify and extract) for 'abseil-populate' Step #3 - "compile-libfuzzer-coverage-x86_64": -- Downloading... Step #3 - "compile-libfuzzer-coverage-x86_64": dst='/src/tink/cc/fuzzing/_deps/abseil-subbuild/abseil-populate-prefix/src/20230802.1.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": timeout='none' Step #3 - "compile-libfuzzer-coverage-x86_64": inactivity timeout='none' Step #3 - "compile-libfuzzer-coverage-x86_64": -- Using src='https://github.com/abseil/abseil-cpp/archive/refs/tags/20230802.1.zip' Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Error at abseil-subbuild/abseil-populate-prefix/src/abseil-populate-stamp/download-abseil-populate.cmake:162 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": Each download failed! Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": error: downloading 'https://github.com/abseil/abseil-cpp/archive/refs/tags/20230802.1.zip' failed Step #3 - "compile-libfuzzer-coverage-x86_64": status_code: 22 Step #3 - "compile-libfuzzer-coverage-x86_64": status_string: "HTTP response code said error" Step #3 - "compile-libfuzzer-coverage-x86_64": log: Step #3 - "compile-libfuzzer-coverage-x86_64": --- LOG BEGIN --- Step #3 - "compile-libfuzzer-coverage-x86_64": timeout on name lookup is not supported Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Host github.com:443 was resolved. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": IPv6: (none) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": IPv4: 140.82.114.3 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Trying 140.82.114.3:443... Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Connected to github.com (140.82.114.3) port 443 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ALPN: curl offers h2,http/1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (OUT), TLS handshake, Client hello (1): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [512 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Server hello (2): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [122 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [19 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Certificate (11): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [3135 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, CERT verify (15): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [79 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Finished (20): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [36 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (OUT), TLS handshake, Finished (20): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [36 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256 / [blank] / UNDEF Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ALPN: server accepted h2 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Server certificate: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": subject: CN=github.com Step #3 - "compile-libfuzzer-coverage-x86_64": start date: Feb 5 00:00:00 2025 GMT Step #3 - "compile-libfuzzer-coverage-x86_64": expire date: Feb 5 23:59:59 2026 GMT Step #3 - "compile-libfuzzer-coverage-x86_64": subjectAltName: host "github.com" matched cert's "github.com" Step #3 - "compile-libfuzzer-coverage-x86_64": issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo ECC Domain Validation Secure Server CA Step #3 - "compile-libfuzzer-coverage-x86_64": SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway. Step #3 - "compile-libfuzzer-coverage-x86_64": Certificate level 0: Public key type ? (256/128 Bits/secBits), signed using ecdsa-with-SHA256 Step #3 - "compile-libfuzzer-coverage-x86_64": Certificate level 1: Public key type ? (256/128 Bits/secBits), signed using ecdsa-with-SHA384 Step #3 - "compile-libfuzzer-coverage-x86_64": Certificate level 2: Public key type ? (384/192 Bits/secBits), signed using sha384WithRSAEncryption Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": using HTTP/2 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] OPENED stream for Step #3 - "compile-libfuzzer-coverage-x86_64": https://github.com/abseil/abseil-cpp/archive/refs/tags/20230802.1.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [:method: GET] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [:scheme: https] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [:authority: github.com] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [:path: /abseil/abseil-cpp/archive/refs/tags/20230802.1.zip] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [user-agent: curl/8.6.0] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [HTTP/2] [1] [accept: */*] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": GET /abseil/abseil-cpp/archive/refs/tags/20230802.1.zip HTTP/2 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Host: github.com Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": User-Agent: curl/8.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Accept: */* Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [57 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": TLSv1.3 (IN), TLS handshake, Newsession Ticket (4): Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [57 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": old SSL session ID is stale, removing Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [1 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": [5 bytes data] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP/2 504 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": cache-control: no-cache Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": content-type: text/html; charset=utf-8 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": strict-transport-security: max-age=31536000; includeSubDomains; preload Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": x-content-type-options: nosniff Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": x-frame-options: deny Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": x-xss-protection: 0 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": content-security-policy: default-src 'none'; style-src 'unsafe-inline'; Step #3 - "compile-libfuzzer-coverage-x86_64": img-src data:; Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": The requested URL returned error: 504 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Connection #0 to host github.com left intact Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": --- LOG END --- Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: *** [CMakeFiles/abseil-populate.dir/build.make:100: abseil-populate-prefix/src/abseil-populate-stamp/abseil-populate-download] Error 1 Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: *** [CMakeFiles/Makefile2:83: CMakeFiles/abseil-populate.dir/all] Error 2 Step #3 - "compile-libfuzzer-coverage-x86_64": make: *** [Makefile:91: all] Error 2 Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Error at /usr/local/share/cmake-3.29/Modules/FetchContent.cmake:1714 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": Build step for abseil failed: 2 Step #3 - "compile-libfuzzer-coverage-x86_64": Call Stack (most recent call first): Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/cmake-3.29/Modules/FetchContent.cmake:1854:EVAL:2 (__FetchContent_directPopulate) Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/share/cmake-3.29/Modules/FetchContent.cmake:1854 (cmake_language) Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/cmake/HttpArchive.cmake:58 (FetchContent_Populate) Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/cmake/TinkWorkspace.cmake:83 (http_archive) Step #3 - "compile-libfuzzer-coverage-x86_64": /src/tink/CMakeLists.txt:17 (include) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring incomplete, errors occurred! Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image tink Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 tink Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1