starting build "133f2c94-99c6-428f-b939-dbec1f4dbc94" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 9.728kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: f797748c200e: Pulling fs layer Step #1: 4f55643ecb31: Pulling fs layer Step #1: 038d14087e89: Pulling fs layer Step #1: 0b35067e000f: Pulling fs layer Step #1: c310645cdd1e: Pulling fs layer Step #1: 31b5dbaf7de5: Pulling fs layer Step #1: 7f6b97aeea6a: Pulling fs layer Step #1: 69fde16cbedc: Pulling fs layer Step #1: 12435933ced6: Pulling fs layer Step #1: ef2f4a7264a0: Pulling fs layer Step #1: 070d03d3a5b2: Pulling fs layer Step #1: 2b2bab26da05: Pulling fs layer Step #1: 0f685d17f962: Pulling fs layer Step #1: 25f134ee376d: Pulling fs layer Step #1: 19e1aaeb608b: Pulling fs layer Step #1: 89d75a401435: Pulling fs layer Step #1: 6c57943694b1: Pulling fs layer Step #1: a64922462a70: Pulling fs layer Step #1: dbde0fe5c300: Pulling fs layer Step #1: 4b9c78b62b4c: Pulling fs layer Step #1: 83827ca57512: Pulling fs layer Step #1: b05876d8368f: Pulling fs layer Step #1: ca8ba5967ffe: Pulling fs layer Step #1: 2fff3fb6bee8: Pulling fs layer Step #1: 282e9778eefd: Pulling fs layer Step #1: 2760df7bf6b0: Pulling fs layer Step #1: 3fcd7ea5e679: Pulling fs layer Step #1: 4e9d485fc3d7: Pulling fs layer Step #1: bcccda745d7a: Pulling fs layer Step #1: c68ef88f66d1: Pulling fs layer Step #1: 4267386569a2: Pulling fs layer Step #1: 1e344591e318: Pulling fs layer Step #1: 306fb545b300: Pulling fs layer Step #1: e5bd1b7c8559: Pulling fs layer Step #1: 7f6b97aeea6a: Waiting Step #1: 69fde16cbedc: Waiting Step #1: 0f685d17f962: Waiting Step #1: 12435933ced6: Waiting Step #1: 25f134ee376d: Waiting Step #1: 19e1aaeb608b: Waiting Step #1: 89d75a401435: Waiting Step #1: 6c57943694b1: Waiting Step #1: 038d14087e89: Waiting Step #1: a64922462a70: Waiting Step #1: 282e9778eefd: Waiting Step #1: dbde0fe5c300: Waiting Step #1: c68ef88f66d1: Waiting Step #1: 4b9c78b62b4c: Waiting Step #1: 4267386569a2: Waiting Step #1: 83827ca57512: Waiting Step #1: b05876d8368f: Waiting Step #1: 1e344591e318: Waiting Step #1: ca8ba5967ffe: Waiting Step #1: 2fff3fb6bee8: Waiting Step #1: 306fb545b300: Waiting Step #1: 0b35067e000f: Waiting Step #1: 4e9d485fc3d7: Waiting Step #1: c310645cdd1e: Waiting Step #1: ef2f4a7264a0: Waiting Step #1: bcccda745d7a: Waiting Step #1: 2760df7bf6b0: Waiting Step #1: 31b5dbaf7de5: Waiting Step #1: 2b2bab26da05: Waiting Step #1: 070d03d3a5b2: Waiting Step #1: 3fcd7ea5e679: Waiting Step #1: 4f55643ecb31: Verifying Checksum Step #1: 4f55643ecb31: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 038d14087e89: Verifying Checksum Step #1: 038d14087e89: Download complete Step #1: 0b35067e000f: Verifying Checksum Step #1: 0b35067e000f: Download complete Step #1: c310645cdd1e: Download complete Step #1: f797748c200e: Verifying Checksum Step #1: f797748c200e: Download complete Step #1: 7f6b97aeea6a: Verifying Checksum Step #1: 7f6b97aeea6a: Download complete Step #1: 69fde16cbedc: Verifying Checksum Step #1: 69fde16cbedc: Download complete Step #1: b549f31133a9: Pull complete Step #1: ef2f4a7264a0: Verifying Checksum Step #1: ef2f4a7264a0: Download complete Step #1: 070d03d3a5b2: Verifying Checksum Step #1: 070d03d3a5b2: Download complete Step #1: 2b2bab26da05: Verifying Checksum Step #1: 2b2bab26da05: Download complete Step #1: 0f685d17f962: Verifying Checksum Step #1: 0f685d17f962: Download complete Step #1: 25f134ee376d: Verifying Checksum Step #1: 25f134ee376d: Download complete Step #1: 12435933ced6: Verifying Checksum Step #1: 12435933ced6: Download complete Step #1: 19e1aaeb608b: Verifying Checksum Step #1: 19e1aaeb608b: Download complete Step #1: 6c57943694b1: Download complete Step #1: 89d75a401435: Verifying Checksum Step #1: 89d75a401435: Download complete Step #1: a64922462a70: Verifying Checksum Step #1: a64922462a70: Download complete Step #1: dbde0fe5c300: Verifying Checksum Step #1: dbde0fe5c300: Download complete Step #1: 31b5dbaf7de5: Verifying Checksum Step #1: 31b5dbaf7de5: Download complete Step #1: 4b9c78b62b4c: Verifying Checksum Step #1: 4b9c78b62b4c: Download complete Step #1: 83827ca57512: Verifying Checksum Step #1: 83827ca57512: Download complete Step #1: b05876d8368f: Download complete Step #1: 2fff3fb6bee8: Verifying Checksum Step #1: 2fff3fb6bee8: Download complete Step #1: ca8ba5967ffe: Verifying Checksum Step #1: ca8ba5967ffe: Download complete Step #1: 282e9778eefd: Verifying Checksum Step #1: 282e9778eefd: Download complete Step #1: 2760df7bf6b0: Verifying Checksum Step #1: 2760df7bf6b0: Download complete Step #1: 3fcd7ea5e679: Verifying Checksum Step #1: 3fcd7ea5e679: Download complete Step #1: bcccda745d7a: Download complete Step #1: 4e9d485fc3d7: Verifying Checksum Step #1: 4e9d485fc3d7: Download complete Step #1: c68ef88f66d1: Download complete Step #1: 4267386569a2: Download complete Step #1: 1e344591e318: Download complete Step #1: f797748c200e: Pull complete Step #1: 4f55643ecb31: Pull complete Step #1: e5bd1b7c8559: Verifying Checksum Step #1: e5bd1b7c8559: Download complete Step #1: 038d14087e89: Pull complete Step #1: 0b35067e000f: Pull complete Step #1: 306fb545b300: Verifying Checksum Step #1: 306fb545b300: Download complete Step #1: c310645cdd1e: Pull complete Step #1: 31b5dbaf7de5: Pull complete Step #1: 7f6b97aeea6a: Pull complete Step #1: 69fde16cbedc: Pull complete Step #1: 12435933ced6: Pull complete Step #1: ef2f4a7264a0: Pull complete Step #1: 070d03d3a5b2: Pull complete Step #1: 2b2bab26da05: Pull complete Step #1: 0f685d17f962: Pull complete Step #1: 25f134ee376d: Pull complete Step #1: 19e1aaeb608b: Pull complete Step #1: 89d75a401435: Pull complete Step #1: 6c57943694b1: Pull complete Step #1: a64922462a70: Pull complete Step #1: dbde0fe5c300: Pull complete Step #1: 4b9c78b62b4c: Pull complete Step #1: 83827ca57512: Pull complete Step #1: b05876d8368f: Pull complete Step #1: ca8ba5967ffe: Pull complete Step #1: 2fff3fb6bee8: Pull complete Step #1: 282e9778eefd: Pull complete Step #1: 2760df7bf6b0: Pull complete Step #1: 3fcd7ea5e679: Pull complete Step #1: 4e9d485fc3d7: Pull complete Step #1: bcccda745d7a: Pull complete Step #1: c68ef88f66d1: Pull complete Step #1: 4267386569a2: Pull complete Step #1: 1e344591e318: Pull complete Step #1: 306fb545b300: Pull complete Step #1: e5bd1b7c8559: Pull complete Step #1: Digest: sha256:21d7f99b5bc5eba3d6fd4e1f1578db092a5195bfa84a226d34de1482d1b8a98c Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 82911ea2abe3 Step #1: Step 2/6 : RUN git clone --depth 1 https://github.com/google/gonids Step #1: ---> Running in 7d61d2f51348 Step #1: Cloning into 'gonids'... Step #1: Removing intermediate container 7d61d2f51348 Step #1: ---> b1a0f310c3cc Step #1: Step 3/6 : ADD https://rules.emergingthreats.net/open/suricata/emerging.rules.zip emerging.rules.zip Step #1: Step #1: Step #1: ---> cc21685a3a09 Step #1: Step 4/6 : COPY build.sh $SRC/ Step #1: ---> 87555f5d6458 Step #1: Step 5/6 : COPY *.diff $SRC/ Step #1: ---> d20db65d8980 Step #1: Step 6/6 : WORKDIR $SRC/gonids Step #1: ---> Running in 07fe39425285 Step #1: Removing intermediate container 07fe39425285 Step #1: ---> 0b7018a209af Step #1: Successfully built 0b7018a209af Step #1: Successfully tagged gcr.io/oss-fuzz/gonids:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gonids Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file56Js8P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gonids/.git Step #2 - "srcmap": + GIT_DIR=/src/gonids Step #2 - "srcmap": + cd /src/gonids Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gonids Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c9bac16ccf6ac17f450bea16d30723021ee7cc51 Step #2 - "srcmap": + jq_inplace /tmp/file56Js8P '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "c9bac16ccf6ac17f450bea16d30723021ee7cc51" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileqeKhra Step #2 - "srcmap": + cat /tmp/file56Js8P Step #2 - "srcmap": + jq '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "c9bac16ccf6ac17f450bea16d30723021ee7cc51" }' Step #2 - "srcmap": + mv /tmp/fileqeKhra /tmp/file56Js8P Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file56Js8P Step #2 - "srcmap": + rm /tmp/file56Js8P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gonids": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gonids", Step #2 - "srcmap": "rev": "c9bac16ccf6ac17f450bea16d30723021ee7cc51" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/google/gonids FuzzParseRule fuzz_parserule Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/google/gonids: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip emerging.rules.zip Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: emerging.rules.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: rules/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/3coresec.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/BSD-License.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/LICENSE Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/botcc.portgrouped.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/botcc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/ciarmy.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/classification.config Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/compromised-ips.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/compromised.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/drop.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/dshield.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-activex.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-adware_pup.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-attack_response.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-chat.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-coinminer.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-current_events.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-deleted.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-dns.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-dos.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-exploit.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-exploit_kit.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-ftp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-games.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-hunting.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-icmp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-icmp_info.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-imap.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-inappropriate.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-info.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-ja3.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-malware.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-misc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-mobile_malware.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-netbios.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-p2p.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-phishing.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-policy.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-pop3.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-retired.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-rpc.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-scada.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-scan.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-shellcode.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-smtp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-snmp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-sql.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-telnet.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-tftp.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-user_agents.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-voip.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_client.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_server.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-web_specific_apps.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/emerging-worm.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/gpl-2.0.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/sid-msg.map Step #3 - "compile-libfuzzer-coverage-x86_64": extracting: rules/suricata-5.0-enhanced-open.txt Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/threatview_CS_c2.rules Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: rules/tor.rules Step #3 - "compile-libfuzzer-coverage-x86_64": + cd rules Step #3 - "compile-libfuzzer-coverage-x86_64": + i=0 Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir corpus Step #3 - "compile-libfuzzer-coverage-x86_64": + set +x Step #3 - "compile-libfuzzer-coverage-x86_64": + zip -q -r /workspace/out/libfuzzer-coverage-x86_64/fuzz_parserule_seed_corpus.zip corpus Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f797748c200e: Already exists Step #4: 4f55643ecb31: Already exists Step #4: 7d1046d13012: Pulling fs layer Step #4: e6b14fad447d: Pulling fs layer Step #4: 0232019c8b44: Pulling fs layer Step #4: 6327b4351287: Pulling fs layer Step #4: daddce3bf27b: Pulling fs layer Step #4: 209ebff393a6: Pulling fs layer Step #4: a1837449dfaf: Pulling fs layer Step #4: d55230199934: Pulling fs layer Step #4: a848ecc8d1a8: Pulling fs layer Step #4: 44bfbe8c1305: Pulling fs layer Step #4: b874870579e7: Pulling fs layer Step #4: 29e44f603477: Pulling fs layer Step #4: df1990137f66: Pulling fs layer Step #4: 3dc0655e7e9e: Pulling fs layer Step #4: 8fa01923c8d7: Pulling fs layer Step #4: 48c3d6a55744: Pulling fs layer Step #4: ea2ac6acd0bb: Pulling fs layer Step #4: 6327b4351287: Waiting Step #4: daddce3bf27b: Waiting Step #4: 209ebff393a6: Waiting Step #4: a848ecc8d1a8: Waiting Step #4: a1837449dfaf: Waiting Step #4: 44bfbe8c1305: Waiting Step #4: d55230199934: Waiting Step #4: 8fa01923c8d7: Waiting Step #4: 48c3d6a55744: Waiting Step #4: ea2ac6acd0bb: Waiting Step #4: b874870579e7: Waiting Step #4: 29e44f603477: Waiting Step #4: 3dc0655e7e9e: Waiting Step #4: df1990137f66: Waiting Step #4: 0232019c8b44: Verifying Checksum Step #4: 0232019c8b44: Download complete Step #4: 7d1046d13012: Verifying Checksum Step #4: 7d1046d13012: Download complete Step #4: e6b14fad447d: Verifying Checksum Step #4: e6b14fad447d: Download complete Step #4: 7d1046d13012: Pull complete Step #4: 209ebff393a6: Verifying Checksum Step #4: 209ebff393a6: Download complete Step #4: daddce3bf27b: Verifying Checksum Step #4: daddce3bf27b: Download complete Step #4: a1837449dfaf: Verifying Checksum Step #4: a1837449dfaf: Download complete Step #4: e6b14fad447d: Pull complete Step #4: 0232019c8b44: Pull complete Step #4: a848ecc8d1a8: Download complete Step #4: d55230199934: Verifying Checksum Step #4: d55230199934: Download complete Step #4: 6327b4351287: Verifying Checksum Step #4: 6327b4351287: Download complete Step #4: b874870579e7: Verifying Checksum Step #4: b874870579e7: Download complete Step #4: 29e44f603477: Verifying Checksum Step #4: 29e44f603477: Download complete Step #4: df1990137f66: Verifying Checksum Step #4: df1990137f66: Download complete Step #4: 3dc0655e7e9e: Verifying Checksum Step #4: 3dc0655e7e9e: Download complete Step #4: 8fa01923c8d7: Verifying Checksum Step #4: 8fa01923c8d7: Download complete Step #4: 48c3d6a55744: Download complete Step #4: 44bfbe8c1305: Verifying Checksum Step #4: 44bfbe8c1305: Download complete Step #4: ea2ac6acd0bb: Verifying Checksum Step #4: ea2ac6acd0bb: Download complete Step #4: 6327b4351287: Pull complete Step #4: daddce3bf27b: Pull complete Step #4: 209ebff393a6: Pull complete Step #4: a1837449dfaf: Pull complete Step #4: d55230199934: Pull complete Step #4: a848ecc8d1a8: Pull complete Step #4: 44bfbe8c1305: Pull complete Step #4: b874870579e7: Pull complete Step #4: 29e44f603477: Pull complete Step #4: df1990137f66: Pull complete Step #4: 3dc0655e7e9e: Pull complete Step #4: 8fa01923c8d7: Pull complete Step #4: 48c3d6a55744: Pull complete Step #4: ea2ac6acd0bb: Pull complete Step #4: Digest: sha256:c97dc51e0855d4392430d46443a43c346e5c80c655afea40edd68fff17c5ad4c Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target fuzz_parserule Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/5 files][ 0.0 B/317.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/cpu.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][ 0.0 B/317.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][167.1 KiB/317.5 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/5 files][167.1 KiB/317.5 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/5 files][167.1 KiB/317.5 KiB] 52% Done / [1/5 files][193.0 KiB/317.5 KiB] 60% Done / [2/5 files][317.5 KiB/317.5 KiB] 99% Done / [3/5 files][317.5 KiB/317.5 KiB] 99% Done / [4/5 files][317.5 KiB/317.5 KiB] 99% Done / [5/5 files][317.5 KiB/317.5 KiB] 100% Done Step #7: Operation completed over 5 objects/317.5 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parserule.json [Content-Type=application/json]... Step #9: / [0/2 files][ 0.0 B/ 3.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [0/2 files][ 0.0 B/ 3.0 KiB] 0% Done / [1/2 files][ 3.0 KiB/ 3.0 KiB] 99% Done / [2/2 files][ 3.0 KiB/ 3.0 KiB] 100% Done Step #9: Operation completed over 2 objects/3.0 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_parserule.log [Content-Type=application/octet-stream]... Step #11: / [0/1 files][ 0.0 B/ 75.0 B] 0% Done / [1/1 files][ 75.0 B/ 75.0 B] 100% Done Step #11: Operation completed over 1 objects/75.0 B. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 147.0 B] / [1 files][ 147.0 B/ 147.0 B] Step #12: Operation completed over 1 objects/147.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 306 0 0 100 306 0 1372 --:--:-- --:--:-- --:--:-- 1378 Finished Step #13 PUSH DONE