starting build "06d43b6a-ca1f-4f99-80f9-2f04687c3086" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936" Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Sending build context to Docker daemon 5.12kB Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b549f31133a9: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f2a0a2122cac: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f1f49e88d4a6: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 17d09567dfe3: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 0f004aebf452: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 81b1fa092e37: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 094e4def4526: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ef7d71d3817: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4d673f9814a2: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1fdb387d4652: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": bc3c0b4d9b06: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b9e112c3ee27: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": de3f39d1683e: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eaee4dbf6fb6: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1db49769b75e: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 32c617d4b9da: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 160bfab4072d: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 9c2c5bb10f30: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b40969a9c0de: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 31f14e4b2fec: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1a033f98c348: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd114ddf6ba3: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 86e657ced17e: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 69b68153a45f: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8095000851d5: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 23223128b05e: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": df11e8de3d8a: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8d0541a29768: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd994df9c7b7: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b23cc085e692: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 96d2e6872be3: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 196a6d800c34: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 139e6491fe45: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3a58e2989131: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 094e4def4526: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ebb27817e6e: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1137632ee490: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ef7d71d3817: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eebc460e731a: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3162ce6f1070: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 116765f29b82: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1fdb387d4652: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 6d22c38dfc37: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4d673f9814a2: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": bc3c0b4d9b06: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b9e112c3ee27: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": de3f39d1683e: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eaee4dbf6fb6: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 90c45aaf766f: Pulling fs layer Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1db49769b75e: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 32c617d4b9da: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 69b68153a45f: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 160bfab4072d: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8095000851d5: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 23223128b05e: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 9c2c5bb10f30: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": df11e8de3d8a: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ebb27817e6e: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd114ddf6ba3: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1137632ee490: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 86e657ced17e: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 196a6d800c34: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b40969a9c0de: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eebc460e731a: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 139e6491fe45: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8d0541a29768: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b23cc085e692: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1a033f98c348: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 31f14e4b2fec: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd994df9c7b7: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 96d2e6872be3: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 6d22c38dfc37: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 90c45aaf766f: Waiting Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 0f004aebf452: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 0f004aebf452: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f1f49e88d4a6: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f1f49e88d4a6: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 094e4def4526: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 094e4def4526: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ef7d71d3817: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ef7d71d3817: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b549f31133a9: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b549f31133a9: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 17d09567dfe3: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 17d09567dfe3: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": bc3c0b4d9b06: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": bc3c0b4d9b06: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b9e112c3ee27: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b9e112c3ee27: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": de3f39d1683e: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": de3f39d1683e: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eaee4dbf6fb6: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eaee4dbf6fb6: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1db49769b75e: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1db49769b75e: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f2a0a2122cac: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f2a0a2122cac: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 32c617d4b9da: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 32c617d4b9da: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1fdb387d4652: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1fdb387d4652: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 9c2c5bb10f30: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 9c2c5bb10f30: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b40969a9c0de: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b40969a9c0de: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 31f14e4b2fec: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 31f14e4b2fec: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 160bfab4072d: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 160bfab4072d: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1a033f98c348: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1a033f98c348: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd114ddf6ba3: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd114ddf6ba3: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 69b68153a45f: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 69b68153a45f: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 86e657ced17e: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 86e657ced17e: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8095000851d5: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8095000851d5: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b549f31133a9: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": df11e8de3d8a: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": df11e8de3d8a: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 23223128b05e: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8d0541a29768: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8d0541a29768: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd994df9c7b7: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd994df9c7b7: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 96d2e6872be3: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 96d2e6872be3: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 196a6d800c34: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 196a6d800c34: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b23cc085e692: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b23cc085e692: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 139e6491fe45: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3a58e2989131: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3a58e2989131: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4d673f9814a2: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4d673f9814a2: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ebb27817e6e: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1137632ee490: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1137632ee490: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 116765f29b82: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 116765f29b82: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 90c45aaf766f: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eebc460e731a: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eebc460e731a: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3162ce6f1070: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3162ce6f1070: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 81b1fa092e37: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 81b1fa092e37: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 6d22c38dfc37: Verifying Checksum Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 6d22c38dfc37: Download complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f2a0a2122cac: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": f1f49e88d4a6: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 17d09567dfe3: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 0f004aebf452: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 81b1fa092e37: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 094e4def4526: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ef7d71d3817: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4d673f9814a2: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1fdb387d4652: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": bc3c0b4d9b06: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b9e112c3ee27: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": de3f39d1683e: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eaee4dbf6fb6: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1db49769b75e: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 32c617d4b9da: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 160bfab4072d: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 9c2c5bb10f30: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b40969a9c0de: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 31f14e4b2fec: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1a033f98c348: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd114ddf6ba3: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 86e657ced17e: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 69b68153a45f: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8095000851d5: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 23223128b05e: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": df11e8de3d8a: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 8d0541a29768: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": fd994df9c7b7: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": b23cc085e692: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 96d2e6872be3: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 196a6d800c34: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 139e6491fe45: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3a58e2989131: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 4ebb27817e6e: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 1137632ee490: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": eebc460e731a: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 3162ce6f1070: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 116765f29b82: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 6d22c38dfc37: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": 90c45aaf766f: Pull complete Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Digest: sha256:6335e14566776f7eacc2bb39d6e435dfa8c0f310935534fc875e1d29135a8fda Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> 6d8957b6f214 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 2/6 : RUN git clone --depth 1 https://github.com/oxia-db/oxia Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> Running in d60e589698cf Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Cloning into 'oxia'... Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Removing intermediate container d60e589698cf Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> 4b960008ce1e Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 3/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/cncf-fuzzing Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> Running in 7b42ca38e9e4 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Cloning into 'cncf-fuzzing'... Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Removing intermediate container 7b42ca38e9e4 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> aa49f4c34ac0 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> Running in d8c95625d4cd Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Cloning into 'go-118-fuzz-build'... Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Removing intermediate container d8c95625d4cd Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> 375aa4aa885c Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> 14e7ebd2b2ea Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Step 6/6 : WORKDIR $SRC/oxia Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> Running in c3cdb320b03e Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Removing intermediate container c3cdb320b03e Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": ---> 9a34ca253371 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Successfully built 9a34ca253371 Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Successfully tagged gcr.io/oss-fuzz/oxia:latest Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/oxia:latest Finished Step #1 - "build-4e10d8c8-83ea-4f24-a083-48725710c936" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/oxia Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileAqxRJN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/fileAqxRJN '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileRRTXma Step #2 - "srcmap": + cat /tmp/fileAqxRJN Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/fileRRTXma /tmp/fileAqxRJN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3 Step #2 - "srcmap": + jq_inplace /tmp/fileAqxRJN '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/AdamKorcz/cncf-fuzzing", rev: "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file1ypvkJ Step #2 - "srcmap": + cat /tmp/fileAqxRJN Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/AdamKorcz/cncf-fuzzing", rev: "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" }' Step #2 - "srcmap": + mv /tmp/file1ypvkJ /tmp/fileAqxRJN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/oxia/.git Step #2 - "srcmap": + GIT_DIR=/src/oxia Step #2 - "srcmap": + cd /src/oxia Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/oxia-db/oxia Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f89870f0282ce0671335cfb311a80a443db94da8 Step #2 - "srcmap": + jq_inplace /tmp/fileAqxRJN '."/src/oxia" = { type: "git", url: "https://github.com/oxia-db/oxia", rev: "f89870f0282ce0671335cfb311a80a443db94da8" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file1K7Gpf Step #2 - "srcmap": + cat /tmp/fileAqxRJN Step #2 - "srcmap": + jq '."/src/oxia" = { type: "git", url: "https://github.com/oxia-db/oxia", rev: "f89870f0282ce0671335cfb311a80a443db94da8" }' Step #2 - "srcmap": + mv /tmp/file1K7Gpf /tmp/fileAqxRJN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileAqxRJN Step #2 - "srcmap": + rm /tmp/fileAqxRJN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/cncf-fuzzing", Step #2 - "srcmap": "rev": "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/oxia": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/oxia-db/oxia", Step #2 - "srcmap": "rev": "f89870f0282ce0671335cfb311a80a443db94da8" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/oxia/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-02-15 06:43:21-- https://go.dev/dl/go1.25.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving go.dev (go.dev)... 216.239.36.21, 216.239.38.21, 216.239.32.21, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to go.dev (go.dev)|216.239.36.21|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 302 Found Step #3 - "compile-libfuzzer-coverage-x86_64": Location: https://dl.google.com/go/go1.25.3.linux-amd64.tar.gz [following] Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-02-15 06:43:22-- https://dl.google.com/go/go1.25.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving dl.google.com (dl.google.com)... 74.125.201.190, 74.125.201.136, 74.125.201.93, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to dl.google.com (dl.google.com)|74.125.201.190|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 200 OK Step #3 - "compile-libfuzzer-coverage-x86_64": Length: 59767979 (57M) [application/x-gzip] Step #3 - "compile-libfuzzer-coverage-x86_64": Saving to: 'go1.25.3.linux-amd64.tar.gz' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": go1.25.3. 0%[ ] 0 --.-KB/s go1.25.3.l 0%[ ] 49.16K 238KB/s go1.25.3.li 0%[ ] 209.16K 498KB/s go1.25.3.lin 0%[ ] 481.16K 770KB/s go1.25.3.linu 1%[ ] 865.16K 1.02MB/s go1.25.3.linux 2%[ ] 1.59M 1.55MB/s go1.25.3.linux- 4%[ ] 2.66M 2.16MB/s go1.25.3.linux-a 7%[> ] 4.01M 2.79MB/s go1.25.3.linux-am 12%[=> ] 7.00M 4.28MB/s go1.25.3.linux-amd 20%[===> ] 11.52M 6.21MB/s go1.25.3.linux-amd6 28%[====> ] 16.02M 7.79MB/s o1.25.3.linux-amd64 37%[======> ] 21.48M 9.50MB/s 1.25.3.linux-amd64. 46%[========> ] 26.35M 10.5MB/s .25.3.linux-amd64.t 55%[==========> ] 31.90M 11.8MB/s 25.3.linux-amd64.ta 65%[============> ] 37.32M 12.6MB/s 5.3.linux-amd64.tar 75%[==============> ] 42.96M 13.6MB/s eta 1s .3.linux-amd64.tar. 84%[===============> ] 48.29M 15.7MB/s eta 1s 3.linux-amd64.tar.g 94%[=================> ] 53.89M 17.3MB/s eta 1s go1.25.3.linux-amd6 100%[===================>] 57.00M 18.3MB/s in 3.8s Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": 2026-02-15 06:43:26 (15.2 MB/s) - 'go1.25.3.linux-amd64.tar.gz' saved [59767979/59767979] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": building fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": Setting up seed corpus Step #3 - "compile-libfuzzer-coverage-x86_64": Copied seed corpus from cncf-fuzzing to oxia/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emirpasic/gods/v2 v2.0.0-alpha Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/edsrzf/mmap-go v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20250506013437-ce4c2cf36ca6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/pebble/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.72.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/raft v1.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/fslock v0.0.0-20160525022230-4d5c94c67b4b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magodo/slog2hclog v0.0.0-20240614031327-090ebd72a033 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-metrics v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-msgpack/v2 v2.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/invopop/jsonschema v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-oidc/v3 v3.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-metrics v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.63.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/wk8/go-ordered-map/v2 v2.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bahlo/generic-list-go v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buger/jsonparser v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/redact v1.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/errors v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/crlib v0.0.0-20241112164430-1264a2edc35b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/swiss v0.0.0-20250624142022-d6e517c1d961 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RaduBerinde/axisds v0.0.0-20250419182453-5135a0650657 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DataDog/zstd v1.5.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/tokenbucket v0.0.0-20250429170803-42689b6311bb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/minlz v1.0.1-0.20250507153514-87eb42fe8882 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RaduBerinde/btreemap v0.0.0-20250419174037-3d62b7205d54 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/getsentry/sentry-go v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/logtags v0.0.0-20241215232642-bb51bb14a506 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVPutGet" -> [string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVRangeScan" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVDeleteRange" -> [string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVComparisonTypes" -> [string uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVKeyOrdering" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzMetadataLoadStore" -> [int64 uint16 bool string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzMetadataLeaderHelper" -> [bool string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzE2EOperations" -> [string string string string string string string string string string string string string string string string string string string string uint8 uint8 uint8 uint8 uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzShardStatusUnmarshalInvalid" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzServerGetIdentifier" -> [bool string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWalAppendRead" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWalMultipleEntries" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzHierarchicalEncodeDecode" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzNaturalEncodeDecode" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzEncodingPreservesOrder" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzHierarchicalSortingProperties" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCompareWithSlashProperties" -> [string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzSortingStability" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDatabaseRangeOperations" -> [[]byte []byte int32] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDatabaseKeyValidation" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Copying fuzzer options files Step #3 - "compile-libfuzzer-coverage-x86_64": Converting seed corpus to libFuzzer format Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVPutGet Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVRangeScan Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVDeleteRange Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVComparisonTypes Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVKeyOrdering Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzMetadataLoadStore Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzMetadataLeaderHelper Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzE2EOperations Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzShardStatusUnmarshalInvalid Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzServerGetIdentifier Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzWalAppendRead Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzWalMultipleEntries Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzHierarchicalEncodeDecode Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzNaturalEncodeDecode Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzEncodingPreservesOrder Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzHierarchicalSortingProperties Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzCompareWithSlashProperties Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzSortingStability Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzDatabaseRangeOperations Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzDatabaseKeyValidation Step #3 - "compile-libfuzzer-coverage-x86_64": Seed corpus setup complete Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f2a0a2122cac: Already exists Step #4: f1f49e88d4a6: Already exists Step #4: c2d1ed7b2985: Pulling fs layer Step #4: 587b3bf0e162: Pulling fs layer Step #4: e6e2d325bb74: Pulling fs layer Step #4: c313969456a0: Pulling fs layer Step #4: 652d2fe2a170: Pulling fs layer Step #4: 2b3e7c398e89: Pulling fs layer Step #4: 60b445a55613: Pulling fs layer Step #4: 5ff39dd04463: Pulling fs layer Step #4: 2150328a126d: Pulling fs layer Step #4: 028c31a070e2: Pulling fs layer Step #4: 6cfdcc4ee6fe: Pulling fs layer Step #4: a5c62f49fa6a: Pulling fs layer Step #4: 77188592ea27: Pulling fs layer Step #4: a4e1e9fcad05: Pulling fs layer Step #4: f57629b298b4: Pulling fs layer Step #4: 5921da8d94ca: Pulling fs layer Step #4: 4cbad9dde820: Pulling fs layer Step #4: 6e2c907acecd: Pulling fs layer Step #4: 8af6f9250781: Pulling fs layer Step #4: 4454ee61ee2e: Pulling fs layer Step #4: 65dfeedc7d7d: Pulling fs layer Step #4: 0663118592da: Pulling fs layer Step #4: 7d9c80eb9894: Pulling fs layer Step #4: 98cc5630953c: Pulling fs layer Step #4: 0584540d18b7: Pulling fs layer Step #4: a4e1e9fcad05: Waiting Step #4: 4454ee61ee2e: Waiting Step #4: 4cbad9dde820: Waiting Step #4: 65dfeedc7d7d: Waiting Step #4: 6e2c907acecd: Waiting Step #4: 0663118592da: Waiting Step #4: 8af6f9250781: Waiting Step #4: f57629b298b4: Waiting Step #4: 7d9c80eb9894: Waiting Step #4: 028c31a070e2: Waiting Step #4: 98cc5630953c: Waiting Step #4: 5921da8d94ca: Waiting Step #4: 6cfdcc4ee6fe: Waiting Step #4: 5ff39dd04463: Waiting Step #4: 2150328a126d: Waiting Step #4: e6e2d325bb74: Verifying Checksum Step #4: e6e2d325bb74: Download complete Step #4: 652d2fe2a170: Verifying Checksum Step #4: 652d2fe2a170: Download complete Step #4: c2d1ed7b2985: Download complete Step #4: c313969456a0: Verifying Checksum Step #4: c313969456a0: Download complete Step #4: 587b3bf0e162: Verifying Checksum Step #4: 587b3bf0e162: Download complete Step #4: 5ff39dd04463: Verifying Checksum Step #4: 5ff39dd04463: Download complete Step #4: 60b445a55613: Verifying Checksum Step #4: 60b445a55613: Download complete Step #4: 2150328a126d: Verifying Checksum Step #4: 2150328a126d: Download complete Step #4: c2d1ed7b2985: Pull complete Step #4: a5c62f49fa6a: Verifying Checksum Step #4: a5c62f49fa6a: Download complete Step #4: 77188592ea27: Verifying Checksum Step #4: 77188592ea27: Download complete Step #4: 6cfdcc4ee6fe: Verifying Checksum Step #4: 6cfdcc4ee6fe: Download complete Step #4: f57629b298b4: Verifying Checksum Step #4: f57629b298b4: Download complete Step #4: 587b3bf0e162: Pull complete Step #4: 4cbad9dde820: Verifying Checksum Step #4: 4cbad9dde820: Download complete Step #4: e6e2d325bb74: Pull complete Step #4: 6e2c907acecd: Verifying Checksum Step #4: 6e2c907acecd: Download complete Step #4: 028c31a070e2: Download complete Step #4: c313969456a0: Pull complete Step #4: 4454ee61ee2e: Verifying Checksum Step #4: 4454ee61ee2e: Download complete Step #4: 2b3e7c398e89: Verifying Checksum Step #4: 2b3e7c398e89: Download complete Step #4: 65dfeedc7d7d: Verifying Checksum Step #4: 65dfeedc7d7d: Download complete Step #4: 652d2fe2a170: Pull complete Step #4: 7d9c80eb9894: Verifying Checksum Step #4: 7d9c80eb9894: Download complete Step #4: 0663118592da: Verifying Checksum Step #4: 0663118592da: Download complete Step #4: 0584540d18b7: Verifying Checksum Step #4: 0584540d18b7: Download complete Step #4: 8af6f9250781: Verifying Checksum Step #4: 8af6f9250781: Download complete Step #4: 98cc5630953c: Verifying Checksum Step #4: 98cc5630953c: Download complete Step #4: a4e1e9fcad05: Verifying Checksum Step #4: a4e1e9fcad05: Download complete Step #4: 5921da8d94ca: Verifying Checksum Step #4: 5921da8d94ca: Download complete Step #4: 2b3e7c398e89: Pull complete Step #4: 60b445a55613: Pull complete Step #4: 5ff39dd04463: Pull complete Step #4: 2150328a126d: Pull complete Step #4: 028c31a070e2: Pull complete Step #4: 6cfdcc4ee6fe: Pull complete Step #4: a5c62f49fa6a: Pull complete Step #4: 77188592ea27: Pull complete Step #4: a4e1e9fcad05: Pull complete Step #4: f57629b298b4: Pull complete Step #4: 5921da8d94ca: Pull complete Step #4: 4cbad9dde820: Pull complete Step #4: 6e2c907acecd: Pull complete Step #4: 8af6f9250781: Pull complete Step #4: 4454ee61ee2e: Pull complete Step #4: 65dfeedc7d7d: Pull complete Step #4: 0663118592da: Pull complete Step #4: 7d9c80eb9894: Pull complete Step #4: 98cc5630953c: Pull complete Step #4: 0584540d18b7: Pull complete Step #4: Digest: sha256:b49badd6eb754a327c78d4ec759527f5a36e54cd7e92d6aa19851cc7456c4dcd Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzSortingStability Step #5: Running go target FuzzCompareWithSlashProperties Step #5: Running go target FuzzEncodingPreservesOrder Step #5: Running go target FuzzKVKeyOrdering Step #5: Running go target FuzzMetadataLeaderHelper Step #5: Generated 467 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzSortingStability Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzHierarchicalSortingProperties Step #5: Running go target FuzzKVDeleteRange Step #5: Running go target FuzzKVComparisonTypes Step #5: Running go target FuzzServerGetIdentifier Step #5: Generated 367 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVKeyOrdering Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzE2EOperations Step #5: Running go target FuzzKVRangeScan Step #5: Generated 105 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzMetadataLeaderHelper Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 163 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCompareWithSlashProperties Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 95 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzServerGetIdentifier Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 665 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzEncodingPreservesOrder Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 528 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzHierarchicalSortingProperties Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 409 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVComparisonTypes Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzShardStatusUnmarshalInvalid Step #5: Running go target FuzzKVPutGet Step #5: Running go target FuzzWalMultipleEntries Step #5: Running go target FuzzHierarchicalEncodeDecode Step #5: Running go target FuzzDatabaseKeyValidation Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 607 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVRangeScan Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 222 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDatabaseKeyValidation Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 286 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzHierarchicalEncodeDecode Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2421 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzShardStatusUnmarshalInvalid Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzDatabaseRangeOperations Step #5: Running go target FuzzMetadataLoadStore Step #5: Running go target FuzzWalAppendRead Step #5: Generated 504 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWalMultipleEntries Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 283 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWalAppendRead Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 117 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzMetadataLoadStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 463 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDatabaseRangeOperations Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzNaturalEncodeDecode Step #5: Generated 203 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzNaturalEncodeDecode Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2402 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVDeleteRange Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2593 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzE2EOperations Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1392 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVPutGet Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2026/02/15 06:49:40 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2026/02/15 06:49:40 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 5d1190f163bb: Already exists Step #6: 435356052df1: Pulling fs layer Step #6: 04621c0496d3: Pulling fs layer Step #6: d05feb1fcea2: Pulling fs layer Step #6: 00897aefe914: Pulling fs layer Step #6: cc0c81720e67: Pulling fs layer Step #6: 68c07a984ed2: Pulling fs layer Step #6: 59f431f664f4: Pulling fs layer Step #6: 59f431f664f4: Waiting Step #6: cc0c81720e67: Verifying Checksum Step #6: cc0c81720e67: Download complete Step #6: 68c07a984ed2: Download complete Step #6: 435356052df1: Verifying Checksum Step #6: 435356052df1: Download complete Step #6: 00897aefe914: Download complete Step #6: 04621c0496d3: Verifying Checksum Step #6: 04621c0496d3: Download complete Step #6: 435356052df1: Pull complete Step #6: 59f431f664f4: Verifying Checksum Step #6: 59f431f664f4: Download complete Step #6: 04621c0496d3: Pull complete Step #6: d05feb1fcea2: Download complete Step #6: d05feb1fcea2: Pull complete Step #6: 00897aefe914: Pull complete Step #6: cc0c81720e67: Pull complete Step #6: 68c07a984ed2: Pull complete Step #6: 59f431f664f4: Pull complete Step #6: Digest: sha256:0e3c118d296c8020061c522f129b05f8cbfe911078161c7c42f0039f0a4b4b58 Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done / [1/3 files][ 9.2 KiB/ 9.2 KiB] 99% Done / [2/3 files][ 9.2 KiB/ 9.2 KiB] 99% Done / [3/3 files][ 9.2 KiB/ 9.2 KiB] 100% Done Step #7: Operation completed over 3 objects/9.2 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDatabaseKeyValidation.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVPutGet.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzEncodingPreservesOrder.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWalMultipleEntries.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHierarchicalSortingProperties.json [Content-Type=application/json]... Step #9: / [0/21 files][ 1.6 KiB/ 16.4 KiB] 9% Done / [1/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [2/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [3/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [4/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzShardStatusUnmarshalInvalid.json [Content-Type=application/json]... Step #9: / [4/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDatabaseRangeOperations.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVDeleteRange.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzNaturalEncodeDecode.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzMetadataLoadStore.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVComparisonTypes.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.8 KiB/ 16.4 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCompareWithSlashProperties.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.8 KiB/ 16.4 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzMetadataLeaderHelper.json [Content-Type=application/json]... Step #9: / [5/21 files][ 5.6 KiB/ 16.4 KiB] 34% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVKeyOrdering.json [Content-Type=application/json]... Step #9: / [5/21 files][ 5.6 KiB/ 16.4 KiB] 34% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzServerGetIdentifier.json [Content-Type=application/json]... Step #9: / [5/21 files][ 6.4 KiB/ 16.4 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzSortingStability.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.0 KiB/ 16.4 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHierarchicalEncodeDecode.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.0 KiB/ 16.4 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done / [6/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWalAppendRead.json [Content-Type=application/json]... Step #9: / [6/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVRangeScan.json [Content-Type=application/json]... Step #9: / [6/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done / [7/21 files][ 9.6 KiB/ 16.4 KiB] 58% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzE2EOperations.json [Content-Type=application/json]... Step #9: / [7/21 files][ 10.4 KiB/ 16.4 KiB] 63% Done / [8/21 files][ 12.7 KiB/ 16.4 KiB] 77% Done / [9/21 files][ 12.7 KiB/ 16.4 KiB] 77% Done / [10/21 files][ 12.7 KiB/ 16.4 KiB] 77% Done / [11/21 files][ 12.7 KiB/ 16.4 KiB] 77% Done / [12/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [13/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [14/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [15/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [16/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [17/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [18/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done - - [19/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done - [20/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done - [21/21 files][ 16.4 KiB/ 16.4 KiB] 100% Done Step #9: Operation completed over 21 objects/16.4 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVDeleteRange.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][ 0.0 B/458.7 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHierarchicalSortingProperties.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][ 0.0 B/458.7 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzMetadataLeaderHelper.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][143.1 KiB/458.7 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVRangeScan.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][143.2 KiB/458.7 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzEncodingPreservesOrder.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][143.2 KiB/458.7 KiB] 31% Done / [1/20 files][175.3 KiB/458.7 KiB] 38% Done / [2/20 files][175.3 KiB/458.7 KiB] 38% Done / [3/20 files][175.3 KiB/458.7 KiB] 38% Done / [4/20 files][175.3 KiB/458.7 KiB] 38% Done / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWalAppendRead.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzShardStatusUnmarshalInvalid.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzE2EOperations.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDatabaseKeyValidation.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzServerGetIdentifier.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWalMultipleEntries.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVPutGet.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVComparisonTypes.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCompareWithSlashProperties.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVKeyOrdering.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHierarchicalEncodeDecode.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDatabaseRangeOperations.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzNaturalEncodeDecode.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzSortingStability.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.3 KiB/458.7 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzMetadataLoadStore.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][175.4 KiB/458.7 KiB] 38% Done / [6/20 files][351.5 KiB/458.7 KiB] 76% Done / [7/20 files][351.8 KiB/458.7 KiB] 76% Done / [8/20 files][351.8 KiB/458.7 KiB] 76% Done / [9/20 files][351.8 KiB/458.7 KiB] 76% Done / [10/20 files][351.8 KiB/458.7 KiB] 76% Done / [11/20 files][351.8 KiB/458.7 KiB] 76% Done / [12/20 files][458.7 KiB/458.7 KiB] 99% Done / [13/20 files][458.7 KiB/458.7 KiB] 99% Done / [14/20 files][458.7 KiB/458.7 KiB] 99% Done / [15/20 files][458.7 KiB/458.7 KiB] 99% Done / [16/20 files][458.7 KiB/458.7 KiB] 99% Done / [17/20 files][458.7 KiB/458.7 KiB] 99% Done - - [18/20 files][458.7 KiB/458.7 KiB] 99% Done - [19/20 files][458.7 KiB/458.7 KiB] 99% Done - [20/20 files][458.7 KiB/458.7 KiB] 100% Done Step #11: Operation completed over 20 objects/458.7 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 472.0 B] / [1 files][ 472.0 B/ 472.0 B] Step #12: Operation completed over 1 objects/472.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 300 0 0 100 300 0 1570 --:--:-- --:--:-- --:--:-- 1578 Finished Step #13 PUSH DONE