starting build "f27f70c0-c511-44d4-8c0d-a3856292d4b7" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 12.29kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: d993ff311503: Pulling fs layer Step #1: 5faf80b993b8: Pulling fs layer Step #1: 7946d0b643b7: Pulling fs layer Step #1: eb738e08bf3b: Pulling fs layer Step #1: 248822a2340b: Pulling fs layer Step #1: fa316482a80e: Pulling fs layer Step #1: 3393bbb458d0: Pulling fs layer Step #1: a8fda90a5506: Pulling fs layer Step #1: afcadef54a23: Pulling fs layer Step #1: 4e97a59f9033: Pulling fs layer Step #1: 4a03bd5b3e5c: Pulling fs layer Step #1: be0ac42f34b4: Pulling fs layer Step #1: 7aa9bde37b90: Pulling fs layer Step #1: 95ec4b1337ee: Pulling fs layer Step #1: 19b55f7a831c: Pulling fs layer Step #1: e9c556d304cd: Pulling fs layer Step #1: f9c1e39d9c40: Pulling fs layer Step #1: 5807a1e31ffb: Pulling fs layer Step #1: acc07ec90c58: Pulling fs layer Step #1: d143eec22c7b: Pulling fs layer Step #1: 34c38be78f62: Pulling fs layer Step #1: aa952184efec: Pulling fs layer Step #1: 3393bbb458d0: Waiting Step #1: cb7850020c26: Pulling fs layer Step #1: 9a4eb374175f: Pulling fs layer Step #1: a8fda90a5506: Waiting Step #1: b453205b01ff: Pulling fs layer Step #1: fbea61822e28: Pulling fs layer Step #1: afcadef54a23: Waiting Step #1: 66724beef5c1: Pulling fs layer Step #1: 4e97a59f9033: Waiting Step #1: a204a5883dc9: Pulling fs layer Step #1: 62abd8198968: Pulling fs layer Step #1: 4a03bd5b3e5c: Waiting Step #1: acc07ec90c58: Waiting Step #1: be0ac42f34b4: Waiting Step #1: d143eec22c7b: Waiting Step #1: 9a4eb374175f: Waiting Step #1: 7aa9bde37b90: Waiting Step #1: cb7850020c26: Waiting Step #1: b453205b01ff: Waiting Step #1: 34c38be78f62: Waiting Step #1: fbea61822e28: Waiting Step #1: 66724beef5c1: Waiting Step #1: 95ec4b1337ee: Waiting Step #1: f9c1e39d9c40: Waiting Step #1: 19b55f7a831c: Waiting Step #1: e9c556d304cd: Waiting Step #1: 62abd8198968: Waiting Step #1: 5807a1e31ffb: Waiting Step #1: a204a5883dc9: Waiting Step #1: 248822a2340b: Waiting Step #1: fa316482a80e: Waiting Step #1: eb738e08bf3b: Waiting Step #1: 7946d0b643b7: Waiting Step #1: 5faf80b993b8: Verifying Checksum Step #1: 5faf80b993b8: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: eb738e08bf3b: Verifying Checksum Step #1: eb738e08bf3b: Download complete Step #1: 7946d0b643b7: Verifying Checksum Step #1: 7946d0b643b7: Download complete Step #1: 248822a2340b: Verifying Checksum Step #1: 248822a2340b: Download complete Step #1: d993ff311503: Verifying Checksum Step #1: d993ff311503: Download complete Step #1: 3393bbb458d0: Verifying Checksum Step #1: 3393bbb458d0: Download complete Step #1: a8fda90a5506: Verifying Checksum Step #1: a8fda90a5506: Download complete Step #1: b549f31133a9: Pull complete Step #1: 4e97a59f9033: Verifying Checksum Step #1: 4e97a59f9033: Download complete Step #1: 4a03bd5b3e5c: Verifying Checksum Step #1: 4a03bd5b3e5c: Download complete Step #1: be0ac42f34b4: Verifying Checksum Step #1: be0ac42f34b4: Download complete Step #1: 7aa9bde37b90: Verifying Checksum Step #1: 7aa9bde37b90: Download complete Step #1: 95ec4b1337ee: Verifying Checksum Step #1: 95ec4b1337ee: Download complete Step #1: afcadef54a23: Verifying Checksum Step #1: afcadef54a23: Download complete Step #1: fa316482a80e: Verifying Checksum Step #1: fa316482a80e: Download complete Step #1: e9c556d304cd: Verifying Checksum Step #1: e9c556d304cd: Download complete Step #1: 19b55f7a831c: Verifying Checksum Step #1: 19b55f7a831c: Download complete Step #1: f9c1e39d9c40: Verifying Checksum Step #1: f9c1e39d9c40: Download complete Step #1: acc07ec90c58: Verifying Checksum Step #1: acc07ec90c58: Download complete Step #1: 5807a1e31ffb: Verifying Checksum Step #1: 5807a1e31ffb: Download complete Step #1: aa952184efec: Download complete Step #1: d143eec22c7b: Download complete Step #1: 34c38be78f62: Verifying Checksum Step #1: 34c38be78f62: Download complete Step #1: cb7850020c26: Verifying Checksum Step #1: cb7850020c26: Download complete Step #1: 9a4eb374175f: Verifying Checksum Step #1: 9a4eb374175f: Download complete Step #1: b453205b01ff: Verifying Checksum Step #1: b453205b01ff: Download complete Step #1: 66724beef5c1: Verifying Checksum Step #1: 66724beef5c1: Download complete Step #1: fbea61822e28: Download complete Step #1: a204a5883dc9: Verifying Checksum Step #1: a204a5883dc9: Download complete Step #1: d993ff311503: Pull complete Step #1: 62abd8198968: Verifying Checksum Step #1: 62abd8198968: Download complete Step #1: 5faf80b993b8: Pull complete Step #1: 7946d0b643b7: Pull complete Step #1: eb738e08bf3b: Pull complete Step #1: 248822a2340b: Pull complete Step #1: fa316482a80e: Pull complete Step #1: 3393bbb458d0: Pull complete Step #1: a8fda90a5506: Pull complete Step #1: afcadef54a23: Pull complete Step #1: 4e97a59f9033: Pull complete Step #1: 4a03bd5b3e5c: Pull complete Step #1: be0ac42f34b4: Pull complete Step #1: 7aa9bde37b90: Pull complete Step #1: 95ec4b1337ee: Pull complete Step #1: 19b55f7a831c: Pull complete Step #1: e9c556d304cd: Pull complete Step #1: f9c1e39d9c40: Pull complete Step #1: 5807a1e31ffb: Pull complete Step #1: acc07ec90c58: Pull complete Step #1: d143eec22c7b: Pull complete Step #1: 34c38be78f62: Pull complete Step #1: aa952184efec: Pull complete Step #1: cb7850020c26: Pull complete Step #1: 9a4eb374175f: Pull complete Step #1: b453205b01ff: Pull complete Step #1: fbea61822e28: Pull complete Step #1: 66724beef5c1: Pull complete Step #1: a204a5883dc9: Pull complete Step #1: 62abd8198968: Pull complete Step #1: Digest: sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder@sha256:19782f7fe8092843368894dbc471ce9b30dd6a2813946071a36e8b05f5b1e27e Step #1: ---> e39a0777485f Step #1: Step 2/5 : RUN apt-get update && apt-get install -y zlib1g-dev libicu-dev Step #1: ---> Running in 1e0c7b41a3c1 Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [860 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/restricted i386 Packages [47.1 kB] Step #1: Get:6 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [4186 kB] Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1297 kB] Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 Packages [30.9 kB] Step #1: Get:9 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [1041 kB] Step #1: Get:10 http://security.ubuntu.com/ubuntu focal-security/multiverse i386 Packages [8166 B] Step #1: Get:11 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 Packages [4276 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1: Get:13 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1320 kB] Step #1: Get:14 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [1020 kB] Step #1: Get:15 http://archive.ubuntu.com/ubuntu focal-updates/restricted i386 Packages [49.0 kB] Step #1: Get:16 http://archive.ubuntu.com/ubuntu focal-updates/multiverse amd64 Packages [34.6 kB] Step #1: Get:17 http://archive.ubuntu.com/ubuntu focal-updates/multiverse i386 Packages [9592 B] Step #1: Get:18 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4661 kB] Step #1: Get:19 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1589 kB] Step #1: Get:20 http://archive.ubuntu.com/ubuntu focal-updates/restricted amd64 Packages [4463 kB] Step #1: Fetched 25.3 MB in 2s (11.9 MB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: The following additional packages will be installed: Step #1: icu-devtools libicu66 Step #1: Suggested packages: Step #1: icu-doc Step #1: The following NEW packages will be installed: Step #1: icu-devtools libicu-dev libicu66 zlib1g-dev Step #1: 0 upgraded, 4 newly installed, 0 to remove and 47 not upgraded. Step #1: Need to get 18.3 MB of archives. Step #1: After this operation, 79.5 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 icu-devtools amd64 66.1-2ubuntu2.1 [189 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu-dev amd64 66.1-2ubuntu2.1 [9451 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 18.3 MB in 2s (10.5 MB/s) Step #1: Selecting previously unselected package libicu66:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package icu-devtools. Step #1: Preparing to unpack .../icu-devtools_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking icu-devtools (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libicu-dev:amd64. Step #1: Preparing to unpack .../libicu-dev_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package zlib1g-dev:amd64. Step #1: Preparing to unpack .../zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1: Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up icu-devtools (66.1-2ubuntu2.1) ... Step #1: Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1: Setting up libicu-dev:amd64 (66.1-2ubuntu2.1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Removing intermediate container 1e0c7b41a3c1 Step #1: ---> bf06df26f906 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/google/quiche Step #1: ---> Running in e5adf3fd571f Step #1: Cloning into 'quiche'... Step #1: Removing intermediate container e5adf3fd571f Step #1: ---> 0471843fffd2 Step #1: Step 4/5 : COPY build.sh *.diff $SRC/ Step #1: ---> fc4b2fbf4fb5 Step #1: Step 5/5 : WORKDIR $SRC/quiche Step #1: ---> Running in 1a6f8813d38c Step #1: Removing intermediate container 1a6f8813d38c Step #1: ---> 63ba829bb485 Step #1: Successfully built 63ba829bb485 Step #1: Successfully tagged gcr.io/oss-fuzz/quiche:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/quiche Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filebM5iHL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/quiche/.git Step #2 - "srcmap": + GIT_DIR=/src/quiche Step #2 - "srcmap": + cd /src/quiche Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/quiche Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=16535679768274d3061f1b991082a6a0c8fd1aac Step #2 - "srcmap": + jq_inplace /tmp/filebM5iHL '."/src/quiche" = { type: "git", url: "https://github.com/google/quiche", rev: "16535679768274d3061f1b991082a6a0c8fd1aac" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filedH5b9b Step #2 - "srcmap": + cat /tmp/filebM5iHL Step #2 - "srcmap": + jq '."/src/quiche" = { type: "git", url: "https://github.com/google/quiche", rev: "16535679768274d3061f1b991082a6a0c8fd1aac" }' Step #2 - "srcmap": + mv /tmp/filedH5b9b /tmp/filebM5iHL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filebM5iHL Step #2 - "srcmap": + rm /tmp/filebM5iHL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/quiche": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/quiche", Step #2 - "srcmap": "rev": "16535679768274d3061f1b991082a6a0c8fd1aac" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + find / -name 'libicu*.so' -exec rm '{}' ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + find / -name 'libicu*.so.66' -exec rm '{}' ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + find / -name 'libicu*.so.66.1' -exec rm '{}' ';' Step #3 - "compile-libfuzzer-coverage-x86_64": + git apply /src/quiche-patch.diff Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -DNDEBUG=1' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -DNDEBUG=1' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DNDEBUG=1' Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -DNDEBUG=1' Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel run @com_google_fuzztest//bazel:setup_configs Step #3 - "compile-libfuzzer-coverage-x86_64": 2025/01/17 06:28:40 Downloading https://releases.bazel.build/7.0.0/release/bazel-7.0.0-linux-x86_64... Step #3 - "compile-libfuzzer-coverage-x86_64": Extracting Bazel installation... Step #3 - "compile-libfuzzer-coverage-x86_64": Starting local Bazel server and connecting to it... Step #3 - "compile-libfuzzer-coverage-x86_64": Computing main repo mapping: Step #3 - "compile-libfuzzer-coverage-x86_64": Computing main repo mapping: Step #3 - "compile-libfuzzer-coverage-x86_64": Computing main repo mapping: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @@com_google_fuzztest//bazel:setup_configs (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @@com_google_fuzztest//bazel:setup_configs (1 packages loaded, 0 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target @@com_google_fuzztest//bazel:setup_configs (38 packages loaded, 157 targets configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Analyzed target @@com_google_fuzztest//bazel:setup_configs (43 packages loaded, 182 targets configured). Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Found 1 target... Step #3 - "compile-libfuzzer-coverage-x86_64": Target @@com_google_fuzztest//bazel:setup_configs up-to-date: Step #3 - "compile-libfuzzer-coverage-x86_64": bazel-bin/external/com_google_fuzztest/bazel/setup_configs Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Elapsed time: 7.861s, Critical Path: 0.02s Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: 5 processes: 5 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Build completed successfully, 5 total actions Step #3 - "compile-libfuzzer-coverage-x86_64": INFO: Running command line: bazel-bin/external/com_google_fuzztest/bazel/setup_configs @com_google_fuzztest Step #3 - "compile-libfuzzer-coverage-x86_64": + bazel build --config=oss-fuzz --subcommands --spawn_strategy=sandboxed //quiche:http_frame_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": Computing main repo mapping: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: Step #3 - "compile-libfuzzer-coverage-x86_64": Loading: 0 packages loaded Step #3 - "compile-libfuzzer-coverage-x86_64": WARNING: Build options --action_env, --conlyopt, --copt, and 3 more have changed, discarding analysis cache (this can be expensive, see https://bazel.build/advanced/performance/iteration-speed). Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (1 packages loaded) Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (1 packages loaded, 0 targets con\ Step #3 - "compile-libfuzzer-coverage-x86_64": figured) Step #3 - "compile-libfuzzer-coverage-x86_64":  Analyzing: target //quiche:http_frame_fuzzer (1 packages loaded, 0 targets con\ Step #3 - "compile-libfuzzer-coverage-x86_64": figured) Step #3 - "compile-libfuzzer-coverage-x86_64": [0 / 1] [Prepa] BazelWorkspaceStatusAction stable-status.txt Step #3 - "compile-libfuzzer-coverage-x86_64":   Analyzing: target //quiche:http_frame_fuzzer (43 packages loaded, 1199 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @@com_google_fuzztest//fuzztest ... (2 packages) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_googleurl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_absl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@rules_proto; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_googletest; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_quic_trace; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@rules_java; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@zlib; starting Step #3 - "compile-libfuzzer-coverage-x86_64":            Analyzing: target //quiche:http_frame_fuzzer (51 packages loaded, 1802 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_absl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_googletest; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_quic_trace; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@zlib; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...83865bfcf969f0c71673c1a5eba2814ec447.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_googlesource_code_re2; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...c63a86c634912c563d57bc.zip ... (11 fetches) Step #3 - "compile-libfuzzer-coverage-x86_64":           Analyzing: target //quiche:http_frame_fuzzer (55 packages loaded, 2066 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_absl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...a5eba2814ec447.tar.gz; 2.3 MiB (2,381,152B) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...3d637c083376b86a1.zip; 1.9 MiB (1,957,350B) Step #3 - "compile-libfuzzer-coverage-x86_64":       Analyzing: target //quiche:http_frame_fuzzer (55 packages loaded, 2089 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@com_google_absl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...a5eba2814ec447.tar.gz; 4.3 MiB (4,554,778B) Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...e_absl; Extracting 53e6dae02bf0d9a5a1d304a3d637c083376b86a1.zi\ Step #3 - "compile-libfuzzer-coverage-x86_64": p Step #3 - "compile-libfuzzer-coverage-x86_64":        Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...a5eba2814ec447.tar.gz; 6.7 MiB (6,995,992B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...a5eba2814ec447.tar.gz; 9.0 MiB (9,431,110B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 11.1 MiB (11,617,618B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 13.0 MiB (13,658,182B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 14.8 MiB (15,515,672B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 19.2 MiB (20,185,112B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 21.1 MiB (22,095,942B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 23.3 MiB (24,406,086B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 25.3 MiB (26,512,155B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 27.0 MiB (28,353,260B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 28.8 MiB (30,212,120B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 30.9 MiB (32,374,808B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 32.5 MiB (34,127,896B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 4s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...eba2814ec447.tar.gz; 34.2 MiB (35,907,654B) Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 4s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...2814ec447.tar.gz; 35.9 MiB (37,601,304B) 4s Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 4s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...2814ec447.tar.gz; 37.8 MiB (39,665,690B) 4s Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 4s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...2814ec447.tar.gz; 40.0 MiB (41,959,448B) 4s Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 4s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...2814ec447.tar.gz; 42.4 MiB (44,417,048B) 4s Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 5s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching https://github.com/...2814ec447.tar.gz; 44.9 MiB (47,120,408B) 4s Step #3 - "compile-libfuzzer-coverage-x86_64":     Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 5s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...ingssl; Extracting e2fa83865bfcf969f0c71673c1a5eba2814ec447.ta\ Step #3 - "compile-libfuzzer-coverage-x86_64": r.gz Step #3 - "compile-libfuzzer-coverage-x86_64":      Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching repository @@boringssl; starting 6s Step #3 - "compile-libfuzzer-coverage-x86_64": Fetching ...ingssl; Extracting e2fa83865bfcf969f0c71673c1a5eba2814ec447.ta\ Step #3 - "compile-libfuzzer-coverage-x86_64": r.gz Step #3 - "compile-libfuzzer-coverage-x86_64":      Analyzing: target //quiche:http_frame_fuzzer (80 packages loaded, 2757 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": currently loading: @@boringssl// Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":    ERROR: /src/quiche/quiche/BUILD.bazel:291:8: in deps attribute of cc_test rule //quiche:http_frame_fuzzer: target '//quiche:quiche_platform_default_testonly' does not exist. Since this rule was created by the macro 'cc_test', the error might have been caused by the macro implementation Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (81 packages loaded, 3381 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":   ERROR: /src/quiche/quiche/BUILD.bazel:291:8: Analysis of target '//quiche:http_frame_fuzzer' failed Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (81 packages loaded, 3381 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":   ERROR: Analysis of target '//quiche:http_frame_fuzzer' failed; build aborted Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (81 packages loaded, 3381 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":   INFO: Elapsed time: 7.334s, Critical Path: 0.00s Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (81 packages loaded, 3381 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":   INFO: 1 process: 1 internal. Step #3 - "compile-libfuzzer-coverage-x86_64": Analyzing: target //quiche:http_frame_fuzzer (81 packages loaded, 3381 targets\ Step #3 - "compile-libfuzzer-coverage-x86_64": configured) Step #3 - "compile-libfuzzer-coverage-x86_64": [1 / 1] checking cached actions Step #3 - "compile-libfuzzer-coverage-x86_64":   ERROR: Build did NOT complete successfully Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image quiche Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 quiche Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1