starting build "ef080b18-dbc1-44f1-9832-bea9fa73f41a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 8726513ee210: Pulling fs layer Step #1: 7054a7cd5879: Pulling fs layer Step #1: fa4207b84c31: Pulling fs layer Step #1: c9e16898e54d: Pulling fs layer Step #1: a397e481ff57: Pulling fs layer Step #1: 7f90ecb8e4d6: Pulling fs layer Step #1: ce26b4380d46: Pulling fs layer Step #1: 5dc6edc3cf5f: Pulling fs layer Step #1: 5173cde1bd66: Pulling fs layer Step #1: 1e34e18e386e: Pulling fs layer Step #1: da35800ee821: Pulling fs layer Step #1: 8c2556f55b93: Pulling fs layer Step #1: bf4f02a303d8: Pulling fs layer Step #1: bfc41af53bee: Pulling fs layer Step #1: ee19cad5d6c8: Pulling fs layer Step #1: 43fb6ebaf28e: Pulling fs layer Step #1: e2bf934a1fde: Pulling fs layer Step #1: c9e16898e54d: Waiting Step #1: 67ae2060248d: Pulling fs layer Step #1: eccb1330175b: Pulling fs layer Step #1: 20f0bfcb2bcb: Pulling fs layer Step #1: 0f18c7482fde: Pulling fs layer Step #1: a397e481ff57: Waiting Step #1: f931609958c7: Pulling fs layer Step #1: 7384719a7753: Pulling fs layer Step #1: 7f90ecb8e4d6: Waiting Step #1: b840ccdb7eeb: Pulling fs layer Step #1: bfc41af53bee: Waiting Step #1: cbffa59180b5: Pulling fs layer Step #1: 1e34e18e386e: Waiting Step #1: ee19cad5d6c8: Waiting Step #1: 3291b748342a: Pulling fs layer Step #1: 43fb6ebaf28e: Waiting Step #1: da35800ee821: Waiting Step #1: ef31bd35b792: Pulling fs layer Step #1: b1256746ef70: Pulling fs layer Step #1: 8c2556f55b93: Waiting Step #1: ce1ee8b7110e: Pulling fs layer Step #1: bf4f02a303d8: Waiting Step #1: 1bbdcbbd8481: Pulling fs layer Step #1: e2bf934a1fde: Waiting Step #1: fa4207b84c31: Waiting Step #1: 1933c895cdb1: Pulling fs layer Step #1: b840ccdb7eeb: Waiting Step #1: 20f0bfcb2bcb: Waiting Step #1: f931609958c7: Waiting Step #1: cbffa59180b5: Waiting Step #1: 67ae2060248d: Waiting Step #1: 0f18c7482fde: Waiting Step #1: 3291b748342a: Waiting Step #1: 7384719a7753: Waiting Step #1: b1256746ef70: Waiting Step #1: eccb1330175b: Waiting Step #1: ef31bd35b792: Waiting Step #1: ce26b4380d46: Waiting Step #1: ce1ee8b7110e: Waiting Step #1: 5dc6edc3cf5f: Waiting Step #1: 1933c895cdb1: Waiting Step #1: 5173cde1bd66: Waiting Step #1: 7054a7cd5879: Verifying Checksum Step #1: 7054a7cd5879: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: c9e16898e54d: Verifying Checksum Step #1: c9e16898e54d: Download complete Step #1: fa4207b84c31: Verifying Checksum Step #1: fa4207b84c31: Download complete Step #1: a397e481ff57: Download complete Step #1: ce26b4380d46: Verifying Checksum Step #1: ce26b4380d46: Download complete Step #1: 5dc6edc3cf5f: Verifying Checksum Step #1: 5dc6edc3cf5f: Download complete Step #1: 8726513ee210: Verifying Checksum Step #1: 8726513ee210: Download complete Step #1: 1e34e18e386e: Verifying Checksum Step #1: 1e34e18e386e: Download complete Step #1: da35800ee821: Download complete Step #1: 8c2556f55b93: Download complete Step #1: b549f31133a9: Pull complete Step #1: bf4f02a303d8: Verifying Checksum Step #1: bf4f02a303d8: Download complete Step #1: bfc41af53bee: Verifying Checksum Step #1: bfc41af53bee: Download complete Step #1: ee19cad5d6c8: Verifying Checksum Step #1: ee19cad5d6c8: Download complete Step #1: 43fb6ebaf28e: Verifying Checksum Step #1: 43fb6ebaf28e: Download complete Step #1: e2bf934a1fde: Verifying Checksum Step #1: e2bf934a1fde: Download complete Step #1: 67ae2060248d: Verifying Checksum Step #1: 67ae2060248d: Download complete Step #1: eccb1330175b: Verifying Checksum Step #1: eccb1330175b: Download complete Step #1: 20f0bfcb2bcb: Verifying Checksum Step #1: 20f0bfcb2bcb: Download complete Step #1: 5173cde1bd66: Verifying Checksum Step #1: 5173cde1bd66: Download complete Step #1: f931609958c7: Verifying Checksum Step #1: f931609958c7: Download complete Step #1: 0f18c7482fde: Verifying Checksum Step #1: 0f18c7482fde: Download complete Step #1: 7384719a7753: Download complete Step #1: b840ccdb7eeb: Verifying Checksum Step #1: b840ccdb7eeb: Download complete Step #1: cbffa59180b5: Verifying Checksum Step #1: cbffa59180b5: Download complete Step #1: 3291b748342a: Verifying Checksum Step #1: 3291b748342a: Download complete Step #1: ef31bd35b792: Verifying Checksum Step #1: ef31bd35b792: Download complete Step #1: ce1ee8b7110e: Verifying Checksum Step #1: ce1ee8b7110e: Download complete Step #1: b1256746ef70: Verifying Checksum Step #1: b1256746ef70: Download complete Step #1: 1bbdcbbd8481: Verifying Checksum Step #1: 1bbdcbbd8481: Download complete Step #1: 1933c895cdb1: Verifying Checksum Step #1: 1933c895cdb1: Download complete Step #1: 7f90ecb8e4d6: Verifying Checksum Step #1: 7f90ecb8e4d6: Download complete Step #1: 8726513ee210: Pull complete Step #1: 7054a7cd5879: Pull complete Step #1: fa4207b84c31: Pull complete Step #1: c9e16898e54d: Pull complete Step #1: a397e481ff57: Pull complete Step #1: 7f90ecb8e4d6: Pull complete Step #1: ce26b4380d46: Pull complete Step #1: 5dc6edc3cf5f: Pull complete Step #1: 5173cde1bd66: Pull complete Step #1: 1e34e18e386e: Pull complete Step #1: da35800ee821: Pull complete Step #1: 8c2556f55b93: Pull complete Step #1: bf4f02a303d8: Pull complete Step #1: bfc41af53bee: Pull complete Step #1: ee19cad5d6c8: Pull complete Step #1: 43fb6ebaf28e: Pull complete Step #1: e2bf934a1fde: Pull complete Step #1: 67ae2060248d: Pull complete Step #1: eccb1330175b: Pull complete Step #1: 20f0bfcb2bcb: Pull complete Step #1: 0f18c7482fde: Pull complete Step #1: f931609958c7: Pull complete Step #1: 7384719a7753: Pull complete Step #1: b840ccdb7eeb: Pull complete Step #1: cbffa59180b5: Pull complete Step #1: 3291b748342a: Pull complete Step #1: ef31bd35b792: Pull complete Step #1: b1256746ef70: Pull complete Step #1: ce1ee8b7110e: Pull complete Step #1: 1bbdcbbd8481: Pull complete Step #1: 1933c895cdb1: Pull complete Step #1: Digest: sha256:021bada09d0c99dc65d80c1a6b117fd95e8322ebd06739e63ded862c3bffff64 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> ea2f05890762 Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/google/glog Step #1: ---> Running in e5529a384cf9 Step #1: Cloning into 'glog'... Step #1: Removing intermediate container e5529a384cf9 Step #1: ---> d3db78cb48f5 Step #1: Step 3/4 : COPY build.sh $SRC/ Step #1: ---> 27adb7eb2789 Step #1: Step 4/4 : WORKDIR $SRC/glog Step #1: ---> Running in bd870b52b754 Step #1: Removing intermediate container bd870b52b754 Step #1: ---> d4dc4bde6924 Step #1: Successfully built d4dc4bde6924 Step #1: Successfully tagged gcr.io/oss-fuzz/glog:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/glog Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileXbGwHO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/glog/.git Step #2 - "srcmap": + GIT_DIR=/src/glog Step #2 - "srcmap": + cd /src/glog Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/glog Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=570c7e4e1dd197e9ae2777152b87a5ea9e06bcac Step #2 - "srcmap": + jq_inplace /tmp/fileXbGwHO '."/src/glog" = { type: "git", url: "https://github.com/google/glog", rev: "570c7e4e1dd197e9ae2777152b87a5ea9e06bcac" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileHQXjxb Step #2 - "srcmap": + cat /tmp/fileXbGwHO Step #2 - "srcmap": + jq '."/src/glog" = { type: "git", url: "https://github.com/google/glog", rev: "570c7e4e1dd197e9ae2777152b87a5ea9e06bcac" }' Step #2 - "srcmap": + mv /tmp/fileHQXjxb /tmp/fileXbGwHO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileXbGwHO Step #2 - "srcmap": + rm /tmp/fileXbGwHO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/glog": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/glog", Step #2 - "srcmap": "rev": "570c7e4e1dd197e9ae2777152b87a5ea9e06bcac" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake .. -DWITH_FUZZING=ossfuzz -DBUILD_SHARED_LIBS=OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find GTest (missing: GTest_DIR) Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at CMakeLists.txt:78 (find_package): Step #3 - "compile-libfuzzer-coverage-x86_64": By not providing "Findgflags.cmake" in CMAKE_MODULE_PATH this project has Step #3 - "compile-libfuzzer-coverage-x86_64": asked CMake to find a package configuration file provided by "gflags", but Step #3 - "compile-libfuzzer-coverage-x86_64": CMake did not find one. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find a package configuration file provided by "gflags" (requested Step #3 - "compile-libfuzzer-coverage-x86_64": version 2.2.2) with any of the following names: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": gflagsConfig.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": gflags-config.cmake Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Add the installation prefix of "gflags" to CMAKE_PREFIX_PATH or set Step #3 - "compile-libfuzzer-coverage-x86_64": "gflags_DIR" to a directory containing one of the above files. If "gflags" Step #3 - "compile-libfuzzer-coverage-x86_64": provides a separate development package or SDK, be sure it has been Step #3 - "compile-libfuzzer-coverage-x86_64": installed. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test CMAKE_HAVE_LIBC_PTHREAD - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Threads: TRUE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find Unwind (missing: Unwind_INCLUDE_DIR Unwind_LIBRARY) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include dlfcn.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include dlfcn.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include elf.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include elf.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include glob.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include glob.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include link.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include link.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include pwd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include pwd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/exec_elf.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/exec_elf.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/syscall.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/syscall.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/time.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/time.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/types.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/utsname.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/utsname.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/wait.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include sys/wait.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include syscall.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include syscall.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include syslog.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include syslog.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include ucontext.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include ucontext.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include unistd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include unistd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include stdint.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include stdint.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include stddef.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for C++ include stddef.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of mode_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of mode_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dladdr Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dladdr - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for posix_fadvise Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for posix_fadvise - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pread Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pread - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pwrite Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pwrite - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaction Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaction - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaltstack Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sigaltstack - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for backtrace Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for backtrace - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for backtrace_symbols Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for backtrace_symbols - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for _chsize_s Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for _chsize_s - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for UnDecorateSymbolName Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for UnDecorateSymbolName - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __argv Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for __argv - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getprogname Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getprogname - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for program_invocation_short_name Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for program_invocation_short_name - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE___PROGNAME Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE___PROGNAME - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_PC Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_PC - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_EIP Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_EIP - Failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_RIP Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_PC_FROM_UCONTEXT_uc_mcontext_gregs_REG_RIP - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gmtime_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gmtime_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for localtime_r Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for localtime_r - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_HIDDEN_VISIBILITY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_HIDDEN_VISIBILITY - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_HIDDEN_INLINE_VISIBILITY Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_HIDDEN_INLINE_VISIBILITY - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_DEPRECATED_ATTR Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test COMPILER_HAS_DEPRECATED_ATTR - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (4.1s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.0s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/glog/build Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building CXX object CMakeFiles/glog_internal.dir/src/demangle.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building CXX object CMakeFiles/glog_internal.dir/src/flags.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building CXX object CMakeFiles/glog_internal.dir/src/logging.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building CXX object CMakeFiles/glog_internal.dir/src/raw_logging.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building CXX object CMakeFiles/glog_internal.dir/src/signalhandler.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building CXX object CMakeFiles/glog_internal.dir/src/stacktrace.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building CXX object CMakeFiles/glog_internal.dir/src/symbolize.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building CXX object CMakeFiles/glog_internal.dir/src/utilities.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building CXX object CMakeFiles/glog_internal.dir/src/vlog_is_on.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Built target glog_internal Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Generating CMakeFiles/glog.cc Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object CMakeFiles/symbolize_unittest.dir/src/symbolize_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building CXX object CMakeFiles/logging_unittest.dir/src/logging_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building CXX object CMakeFiles/stl_logging_unittest.dir/src/stl_logging_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building CXX object CMakeFiles/demangle_unittest.dir/src/demangle_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object CMakeFiles/stacktrace_unittest.dir/src/stacktrace_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building CXX object CMakeFiles/signalhandler_unittest.dir/src/signalhandler_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building CXX object CMakeFiles/utilities_unittest.dir/src/utilities_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building CXX object CMakeFiles/cleanup_immediately_unittest.dir/src/cleanup_immediately_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building CXX object CMakeFiles/cleanup_with_relative_prefix_unittest.dir/src/cleanup_with_relative_prefix_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building CXX object CMakeFiles/striplog0_unittest.dir/src/striplog_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object CMakeFiles/cleanup_with_absolute_prefix_unittest.dir/src/cleanup_with_absolute_prefix_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building CXX object CMakeFiles/striplog2_unittest.dir/src/striplog_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building CXX object CMakeFiles/striplog10_unittest.dir/src/striplog_unittest.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building CXX object CMakeFiles/glog.dir/CMakeFiles/glog.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Linking CXX static library libglog.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Built target glog Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building CXX object CMakeFiles/fuzz_demangle.dir/src/fuzz_demangle.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building CXX object CMakeFiles/custom_sink_example.dir/examples/custom_sink.cc.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Linking CXX executable fuzz_demangle Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Built target fuzz_demangle Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Linking CXX executable striplog10_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Linking CXX executable striplog2_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Linking CXX executable stacktrace_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Linking CXX executable striplog0_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 78%] Linking CXX executable custom_sink_example Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking CXX executable signalhandler_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Built target striplog10_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Built target striplog2_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Built target stacktrace_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Built target striplog0_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Linking CXX executable utilities_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Built target custom_sink_example Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Built target signalhandler_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Linking CXX executable symbolize_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 85%] Built target utilities_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Linking CXX executable cleanup_with_absolute_prefix_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Linking CXX executable cleanup_immediately_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Linking CXX executable cleanup_with_relative_prefix_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Linking CXX executable demangle_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target symbolize_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target cleanup_with_absolute_prefix_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target cleanup_immediately_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target cleanup_with_relative_prefix_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target demangle_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Linking CXX executable stl_logging_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target stl_logging_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking CXX executable logging_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target logging_unittest Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz_demangle /workspace/out/libfuzzer-coverage-x86_64/ Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 8726513ee210: Already exists Step #4: 7054a7cd5879: Already exists Step #4: f739589ce639: Pulling fs layer Step #4: b2322709fa19: Pulling fs layer Step #4: ec3daab22494: Pulling fs layer Step #4: 25b017c9085d: Pulling fs layer Step #4: 6d8064d22942: Pulling fs layer Step #4: 2c5826f03939: Pulling fs layer Step #4: 5342ef9d65f0: Pulling fs layer Step #4: bf550828fd45: Pulling fs layer Step #4: 6653c9292bbf: Pulling fs layer Step #4: b1b96c73e874: Pulling fs layer Step #4: 30e213053f23: Pulling fs layer Step #4: 0c00a16d8aaa: Pulling fs layer Step #4: 0468880b53a6: Pulling fs layer Step #4: 6d8064d22942: Waiting Step #4: fe12524a520c: Pulling fs layer Step #4: 222eb0282449: Pulling fs layer Step #4: 242151016182: Pulling fs layer Step #4: 6e1ab450e78e: Pulling fs layer Step #4: 2c5826f03939: Waiting Step #4: bf550828fd45: Waiting Step #4: 5342ef9d65f0: Waiting Step #4: 25b017c9085d: Waiting Step #4: 222eb0282449: Waiting Step #4: 6653c9292bbf: Waiting Step #4: 6e1ab450e78e: Waiting Step #4: 30e213053f23: Waiting Step #4: b1b96c73e874: Waiting Step #4: fe12524a520c: Waiting Step #4: 0c00a16d8aaa: Waiting Step #4: 242151016182: Waiting Step #4: 0468880b53a6: Waiting Step #4: ec3daab22494: Verifying Checksum Step #4: ec3daab22494: Download complete Step #4: f739589ce639: Verifying Checksum Step #4: f739589ce639: Download complete Step #4: b2322709fa19: Verifying Checksum Step #4: b2322709fa19: Download complete Step #4: 6d8064d22942: Verifying Checksum Step #4: 6d8064d22942: Download complete Step #4: 2c5826f03939: Download complete Step #4: 5342ef9d65f0: Verifying Checksum Step #4: 5342ef9d65f0: Download complete Step #4: f739589ce639: Pull complete Step #4: 6653c9292bbf: Verifying Checksum Step #4: 6653c9292bbf: Download complete Step #4: bf550828fd45: Verifying Checksum Step #4: bf550828fd45: Download complete Step #4: b2322709fa19: Pull complete Step #4: 30e213053f23: Verifying Checksum Step #4: 30e213053f23: Download complete Step #4: 0c00a16d8aaa: Download complete Step #4: ec3daab22494: Pull complete Step #4: 25b017c9085d: Verifying Checksum Step #4: 25b017c9085d: Download complete Step #4: b1b96c73e874: Verifying Checksum Step #4: b1b96c73e874: Download complete Step #4: 0468880b53a6: Verifying Checksum Step #4: 0468880b53a6: Download complete Step #4: 222eb0282449: Verifying Checksum Step #4: 222eb0282449: Download complete Step #4: 242151016182: Download complete Step #4: 6e1ab450e78e: Verifying Checksum Step #4: 6e1ab450e78e: Download complete Step #4: fe12524a520c: Verifying Checksum Step #4: fe12524a520c: Download complete Step #4: 25b017c9085d: Pull complete Step #4: 6d8064d22942: Pull complete Step #4: 2c5826f03939: Pull complete Step #4: 5342ef9d65f0: Pull complete Step #4: bf550828fd45: Pull complete Step #4: 6653c9292bbf: Pull complete Step #4: b1b96c73e874: Pull complete Step #4: 30e213053f23: Pull complete Step #4: 0c00a16d8aaa: Pull complete Step #4: 0468880b53a6: Pull complete Step #4: fe12524a520c: Pull complete Step #4: 222eb0282449: Pull complete Step #4: 242151016182: Pull complete Step #4: 6e1ab450e78e: Pull complete Step #4: Digest: sha256:d621363d499310ec5bc7b44d62ff87d43cb095b1d56c74cf68d189ea6487d961 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running fuzz_demangle Step #5: [2024-07-26 06:31:57,708 INFO] Finding shared libraries for targets (if any). Step #5: [2024-07-26 06:31:57,719 INFO] Finished finding shared libraries for targets. Step #5: [2024-07-26 06:31:57,854 INFO] Finding shared libraries for targets (if any). Step #5: [2024-07-26 06:31:57,865 INFO] Finished finding shared libraries for targets. Step #5: [2024-07-26 06:31:58,005 DEBUG] Finished generating per-file code coverage summary. Step #5: [2024-07-26 06:31:58,005 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html". Step #5: [2024-07-26 06:31:58,019 DEBUG] Finished generating file view html index file. Step #5: [2024-07-26 06:31:58,019 DEBUG] Calculating per-directory coverage summary. Step #5: [2024-07-26 06:31:58,019 DEBUG] Finished calculating per-directory coverage summary. Step #5: [2024-07-26 06:31:58,019 DEBUG] Writing per-directory coverage html reports. Step #5: [2024-07-26 06:31:58,062 DEBUG] Finished writing per-directory coverage html reports. Step #5: [2024-07-26 06:31:58,062 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html". Step #5: [2024-07-26 06:31:58,063 DEBUG] Finished generating directory view html index file. Step #5: [2024-07-26 06:31:58,063 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html". Step #5: [2024-07-26 06:31:58,193 DEBUG] Finished generating per-file code coverage summary. Step #5: [2024-07-26 06:31:58,193 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/file_view_index.html". Step #5: [2024-07-26 06:31:58,206 DEBUG] Finished generating file view html index file. Step #5: [2024-07-26 06:31:58,206 DEBUG] Calculating per-directory coverage summary. Step #5: [2024-07-26 06:31:58,206 DEBUG] Finished calculating per-directory coverage summary. Step #5: [2024-07-26 06:31:58,206 DEBUG] Writing per-directory coverage html reports. Step #5: [2024-07-26 06:31:58,249 DEBUG] Finished writing per-directory coverage html reports. Step #5: [2024-07-26 06:31:58,249 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/directory_view_index.html". Step #5: [2024-07-26 06:31:58,249 DEBUG] Finished generating directory view html index file. Step #5: [2024-07-26 06:31:58,249 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/index.html". Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/style.css [Content-Type=text/css]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/report.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done / [0/12 files][ 0.0 B/341.1 KiB] 0% Done / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/report.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/glog/report.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/glog/src/demangle.cc.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/glog/src/report.html [Content-Type=text/html]... Step #7: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done / [1/12 files][ 13.8 KiB/341.1 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/glog/src/fuzz_demangle.cc.html [Content-Type=text/html]... Step #7: / [1/12 files][ 13.8 KiB/341.1 KiB] 4% Done / [2/12 files][ 13.8 KiB/341.1 KiB] 4% Done / [3/12 files][283.1 KiB/341.1 KiB] 82% Done / [4/12 files][283.1 KiB/341.1 KiB] 82% Done / [5/12 files][283.1 KiB/341.1 KiB] 82% Done / [6/12 files][283.1 KiB/341.1 KiB] 82% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/glog/src/utilities.h.html [Content-Type=text/html]... Step #7: / [6/12 files][283.1 KiB/341.1 KiB] 82% Done / [7/12 files][341.1 KiB/341.1 KiB] 99% Done / [8/12 files][341.1 KiB/341.1 KiB] 99% Done / [9/12 files][341.1 KiB/341.1 KiB] 99% Done / [10/12 files][341.1 KiB/341.1 KiB] 99% Done / [11/12 files][341.1 KiB/341.1 KiB] 99% Done / [12/12 files][341.1 KiB/341.1 KiB] 100% Done Step #7: Operation completed over 12 objects/341.1 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/style.css [Content-Type=text/css]... Step #9: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/file_view_index.html [Content-Type=text/html]... Step #9: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/report.html [Content-Type=text/html]... Step #9: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/directory_view_index.html [Content-Type=text/html]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/summary.json [Content-Type=application/json]... Step #9: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/index.html [Content-Type=text/html]... Step #9: / [0/12 files][ 0.0 B/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/report.html [Content-Type=text/html]... Step #9: / [0/12 files][ 2.5 KiB/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/glog/report.html [Content-Type=text/html]... Step #9: / [0/12 files][ 2.5 KiB/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/glog/src/demangle.cc.html [Content-Type=text/html]... Step #9: / [0/12 files][ 2.5 KiB/341.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/glog/src/report.html [Content-Type=text/html]... Step #9: / [0/12 files][ 2.5 KiB/341.1 KiB] 0% Done / [1/12 files][ 18.2 KiB/341.1 KiB] 5% Done / [2/12 files][ 22.5 KiB/341.1 KiB] 6% Done / [3/12 files][ 22.5 KiB/341.1 KiB] 6% Done / [4/12 files][ 22.5 KiB/341.1 KiB] 6% Done / [5/12 files][283.1 KiB/341.1 KiB] 82% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/glog/src/fuzz_demangle.cc.html [Content-Type=text/html]... Step #9: / [5/12 files][283.1 KiB/341.1 KiB] 82% Done / [6/12 files][283.1 KiB/341.1 KiB] 82% Done / [7/12 files][283.1 KiB/341.1 KiB] 82% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzz_demangle/linux/src/glog/src/utilities.h.html [Content-Type=text/html]... Step #9: / [7/12 files][283.1 KiB/341.1 KiB] 82% Done / [8/12 files][283.1 KiB/341.1 KiB] 82% Done / [9/12 files][283.1 KiB/341.1 KiB] 82% Done / [10/12 files][283.1 KiB/341.1 KiB] 82% Done / [11/12 files][341.1 KiB/341.1 KiB] 99% Done / [12/12 files][341.1 KiB/341.1 KiB] 100% Done Step #9: Operation completed over 12 objects/341.1 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_demangle.json [Content-Type=application/json]... Step #11: / [0/2 files][ 0.0 B/ 1.5 KiB] 0% Done / [0/2 files][ 0.0 B/ 1.5 KiB] 0% Done / [1/2 files][ 1.5 KiB/ 1.5 KiB] 99% Done / [2/2 files][ 1.5 KiB/ 1.5 KiB] 100% Done Step #11: Operation completed over 2 objects/1.5 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: CommandException: 1 files/objects could not be removed. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/textcov_reports/fuzz_demangle.covreport [Content-Type=application/octet-stream]... Step #13: / [0/1 files][ 0.0 B/ 64.7 KiB] 0% Done / [1/1 files][ 64.7 KiB/ 64.7 KiB] 100% Done Step #13: Operation completed over 1 objects/64.7 KiB. Finished Step #13 Starting Step #14 Step #14: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #14: CommandException: 1 files/objects could not be removed. Finished Step #14 Starting Step #15 Step #15: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #15: Step #15: ***** NOTICE ***** Step #15: Step #15: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #15: platforms, can be found at Step #15: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #15: Step #15: Suggested alternative images include: Step #15: Step #15: gcr.io/google.com/cloudsdktool/cloud-sdk Step #15: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #15: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #15: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #15: Step #15: Please note that the `gsutil` entrypoint must be specified when using these Step #15: images. Step #15: Step #15: ***** END OF NOTICE ***** Step #15: Step #15: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_demangle.log [Content-Type=application/octet-stream]... Step #15: / [0/1 files][ 0.0 B/ 1.1 KiB] 0% Done / [1/1 files][ 1.1 KiB/ 1.1 KiB] 100% Done Step #15: Operation completed over 1 objects/1.1 KiB. Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #16: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #16: / [0 files][ 0.0 B/ 143.0 B] / [1 files][ 143.0 B/ 143.0 B] Step #16: Operation completed over 1 objects/143.0 B. Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/cloud-builders/curl Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 300 0 0 100 300 0 1630 --:--:-- --:--:-- --:--:-- 1639 Finished Step #17 PUSH DONE