starting build "2060ee47-fcfb-4dee-8584-c40c455d244b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544" Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Sending build context to Docker daemon 10.75kB Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": b549f31133a9: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 279d861c8f8c: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 31644d7ec2a4: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f1edb3478176: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8d5fd8822095: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 309443b163b7: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 02cb59c482b4: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 50ae7b5fff80: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fd52450a2aaf: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 20e5ca9b0e24: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2daad6ce1b8c: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 61ecb907f6c9: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": edaa9df2ed1f: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fabb5a915b96: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 439fbd25f4aa: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 1e16ffbe93c8: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a95d19ab48cc: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 01d362591f6f: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": c3149d2a6a4d: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 68737a9179c9: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7f88aeeb1de1: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 91eea82bda3e: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5ba498bc37e2: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3ca7489a2ff3: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11cfb449f0aa: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ca582508b5dc: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 13e290dcf850: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2b1af999d586: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 387676f4b68d: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a15d5dab1389: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 118f72ac2265: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5c35ecf56351: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8a1717e77753: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": e38d67970c98: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f04a5992b351: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7abe1319454a: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f8afa2c1162d: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 50ae7b5fff80: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": aaea1b23fc59: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3b907eab6039: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": acf4e09bddfa: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 387676f4b68d: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fd52450a2aaf: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7f88aeeb1de1: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 20e5ca9b0e24: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a15d5dab1389: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11e342f75b6e: Pulling fs layer Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2daad6ce1b8c: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 91eea82bda3e: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 118f72ac2265: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5c35ecf56351: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 61ecb907f6c9: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": edaa9df2ed1f: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3ca7489a2ff3: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fabb5a915b96: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11cfb449f0aa: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ca582508b5dc: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 439fbd25f4aa: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 1e16ffbe93c8: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8a1717e77753: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a95d19ab48cc: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": e38d67970c98: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 02cb59c482b4: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 13e290dcf850: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f04a5992b351: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2b1af999d586: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7abe1319454a: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 01d362591f6f: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": acf4e09bddfa: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": c3149d2a6a4d: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": aaea1b23fc59: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 68737a9179c9: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3b907eab6039: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f8afa2c1162d: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11e342f75b6e: Waiting Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 31644d7ec2a4: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 31644d7ec2a4: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8d5fd8822095: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8d5fd8822095: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 02cb59c482b4: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 02cb59c482b4: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 50ae7b5fff80: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 50ae7b5fff80: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": b549f31133a9: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": b549f31133a9: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f1edb3478176: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f1edb3478176: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2daad6ce1b8c: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2daad6ce1b8c: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 61ecb907f6c9: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 61ecb907f6c9: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fabb5a915b96: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": edaa9df2ed1f: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": edaa9df2ed1f: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 439fbd25f4aa: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 439fbd25f4aa: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 1e16ffbe93c8: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 1e16ffbe93c8: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 20e5ca9b0e24: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 20e5ca9b0e24: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 279d861c8f8c: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 279d861c8f8c: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": c3149d2a6a4d: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": c3149d2a6a4d: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 01d362591f6f: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 01d362591f6f: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 68737a9179c9: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 68737a9179c9: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a95d19ab48cc: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a95d19ab48cc: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7f88aeeb1de1: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7f88aeeb1de1: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 91eea82bda3e: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 91eea82bda3e: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3ca7489a2ff3: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11cfb449f0aa: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5ba498bc37e2: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5ba498bc37e2: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ca582508b5dc: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 13e290dcf850: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2b1af999d586: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2b1af999d586: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 387676f4b68d: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 387676f4b68d: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": b549f31133a9: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a15d5dab1389: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a15d5dab1389: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 118f72ac2265: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8a1717e77753: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8a1717e77753: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5c35ecf56351: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": e38d67970c98: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": e38d67970c98: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fd52450a2aaf: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fd52450a2aaf: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f04a5992b351: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7abe1319454a: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7abe1319454a: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3b907eab6039: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3b907eab6039: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11e342f75b6e: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": aaea1b23fc59: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": aaea1b23fc59: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f8afa2c1162d: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f8afa2c1162d: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": acf4e09bddfa: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": acf4e09bddfa: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 279d861c8f8c: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 31644d7ec2a4: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 309443b163b7: Verifying Checksum Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 309443b163b7: Download complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f1edb3478176: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8d5fd8822095: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 309443b163b7: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 02cb59c482b4: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 50ae7b5fff80: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fd52450a2aaf: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 20e5ca9b0e24: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2daad6ce1b8c: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 61ecb907f6c9: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": edaa9df2ed1f: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": fabb5a915b96: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 439fbd25f4aa: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 1e16ffbe93c8: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a95d19ab48cc: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 01d362591f6f: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": c3149d2a6a4d: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 68737a9179c9: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7f88aeeb1de1: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 91eea82bda3e: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5ba498bc37e2: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3ca7489a2ff3: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11cfb449f0aa: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ca582508b5dc: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 13e290dcf850: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 2b1af999d586: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 387676f4b68d: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": a15d5dab1389: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 118f72ac2265: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 5c35ecf56351: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 8a1717e77753: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": e38d67970c98: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f04a5992b351: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 7abe1319454a: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": f8afa2c1162d: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": aaea1b23fc59: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 3b907eab6039: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": acf4e09bddfa: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": 11e342f75b6e: Pull complete Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Digest: sha256:a76acde3b3c309fe277d85fe22ca215d98292a4930c5b305f8688970f03bbe50 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> f98ba30d3b37 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 2/9 : ENV GOPATH="${GOPATH:-/root/go}" Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in 27fce5dfa148 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container 27fce5dfa148 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 657582d03dba Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 3/9 : ENV ORG_ROOT="${GOPATH}/src/github.com/go-git" Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in dbea79d55bf8 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container dbea79d55bf8 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 626a15338259 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 4/9 : RUN mkdir -p "${ORG_ROOT}" Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in 87aff9abd893 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container 87aff9abd893 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 6cc485b51e16 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 5/9 : ARG REPOSITORIES="go-git go-billy" Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in 18c952df478b Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container 18c952df478b Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> ddf1dea6b5b3 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 6/9 : RUN for repo in ${REPOSITORIES}; do git clone --depth 1 "https://github.com/go-git/${repo}" "${ORG_ROOT}/${repo}"; cd "${ORG_ROOT}/${repo}"; go mod download; cd -; done Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in 7ef92ab5c1a6 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Cloning into '/root/go/src/github.com/go-git/go-git'... Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": /src Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Cloning into '/root/go/src/github.com/go-git/go-billy'... Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": /src Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container 7ef92ab5c1a6 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 6839e1aa2600 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 7/9 : RUN go install golang.org/x/tools/cmd/goimports@latest Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in 09d34af17682 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": go: downloading golang.org/x/tools v0.39.0 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": go: downloading golang.org/x/telemetry v0.0.0-20251111182119-bc8e575c7b54 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": go: downloading golang.org/x/mod v0.30.0 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": go: downloading golang.org/x/sync v0.18.0 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container 09d34af17682 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 1fc14b2211f6 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 8/9 : COPY build.sh $SRC/ Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> 6e6a3975a11a Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Step 9/9 : WORKDIR $SRC Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> Running in e52cb833c112 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Removing intermediate container e52cb833c112 Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": ---> c4f23f9a421d Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Successfully built c4f23f9a421d Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Successfully tagged gcr.io/oss-fuzz/go-git:latest Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/go-git:latest Finished Step #1 - "build-2c8ba018-37a1-48cf-aa3c-37c1edc73544" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-git Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filehN79eP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-billy/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-billy Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=7469ffe06db28bbce282cd487b996a0270b6eebd Step #2 - "srcmap": + jq_inplace /tmp/filehN79eP '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "7469ffe06db28bbce282cd487b996a0270b6eebd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileDH3N3b Step #2 - "srcmap": + cat /tmp/filehN79eP Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "7469ffe06db28bbce282cd487b996a0270b6eebd" }' Step #2 - "srcmap": + mv /tmp/fileDH3N3b /tmp/filehN79eP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-git/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-git Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-git Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=4aac0c5378028b2ebc9eac2f0ae220ea2d6e9a14 Step #2 - "srcmap": + jq_inplace /tmp/filehN79eP '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "4aac0c5378028b2ebc9eac2f0ae220ea2d6e9a14" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filefnRHdG Step #2 - "srcmap": + cat /tmp/filehN79eP Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "4aac0c5378028b2ebc9eac2f0ae220ea2d6e9a14" }' Step #2 - "srcmap": + mv /tmp/filefnRHdG /tmp/filehN79eP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filehN79eP Step #2 - "srcmap": + rm /tmp/filehN79eP Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-billy": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-billy", Step #2 - "srcmap": "rev": "7469ffe06db28bbce282cd487b996a0270b6eebd" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-git": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-git", Step #2 - "srcmap": "rev": "4aac0c5378028b2ebc9eac2f0ae220ea2d6e9a14" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + GOPATH=/root/go Step #3 - "compile-libfuzzer-coverage-x86_64": + ORG_ROOT=/root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + PREBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + POSTBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_postbuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + main Step #3 - "compile-libfuzzer-coverage-x86_64": + grep -h '^module github.com/go-git/' /src/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": grep: /src/go.mod: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Going through all repositories in /root/go/src/github.com/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": Going through all repositories in /root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + loop_through_org_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": + local repos= Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /root/go/src/github.com/go-git -type d -mindepth 1 -maxdepth 1 Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -mindepth after the argument -type, but global options are not positional, i.e., -mindepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -maxdepth after the argument -type, but global options are not positional, i.e., -maxdepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": + repos='/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/go-git/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules=. Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules=. Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- blame.go blame_test.go common.go common_test.go crypto.go doc.go example_test.go main_test.go object_walker.go options.go options_test.go prune.go prune_test.go remote.go remote_test.go repository.go repository_common_test.go repository_plan9_test.go repository_test.go repository_unix_test.go repository_wasi_test.go repository_windows_test.go signer.go signer_test.go status.go status_test.go submodule.go submodule_test.go transport.go worktree.go worktree_bsd.go worktree_commit.go worktree_commit_test.go worktree_js.go worktree_linux.go worktree_plan9.go worktree_status.go worktree_status_test.go worktree_test.go worktree_unix_other.go worktree_wasi.go worktree_windows.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package git' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/object/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparsesignedbytes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/object Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package object Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParseSignedBytes(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(openPGPSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(x509SignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(sshSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": parseSignedBytes(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/object FuzzParseSignedBytes FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/transport/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzznewendpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/transport Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package transport Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzNewEndpoint(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": NewEndpoint(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/transport FuzzNewEndpoint FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/packfile/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzpatchdelta Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/packfile Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package packfile Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzPatchDelta(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\f\fsomenewvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0evalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0eva")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x80\x80\x80\x80\x80\x802\x7fvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input1, input2 []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": PatchDelta(input1, input2) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/packfile FuzzPatchDelta FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/config/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzdecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/config Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package config Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzDecoder(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": d := NewDecoder(bytes.NewReader(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": cfg := &Config{} Step #3 - "compile-libfuzzer-coverage-x86_64": d.Decode(cfg) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/config FuzzDecoder FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/revision/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparser Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/revision Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package revision Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParser(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@{2016-12-16T21:42:47Z}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@~3") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("v0.99.8^{}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("master:./README") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/fix nasty bug}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/fix nasty bug") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": parser := NewParser(bytes.NewBufferString(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": parser.Parse() Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/revision FuzzParser FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 279d861c8f8c: Already exists Step #4: 31644d7ec2a4: Already exists Step #4: 2815e0ad7463: Pulling fs layer Step #4: c347ec8e6852: Pulling fs layer Step #4: d8127736e2f1: Pulling fs layer Step #4: bd02e9895020: Pulling fs layer Step #4: f8c1f2e758d2: Pulling fs layer Step #4: 30d46b657234: Pulling fs layer Step #4: 060c2d82682b: Pulling fs layer Step #4: 0cbd83c6ac1e: Pulling fs layer Step #4: eea94528a1e5: Pulling fs layer Step #4: 1d2d5605ff9b: Pulling fs layer Step #4: c08894e66519: Pulling fs layer Step #4: 46950c600e29: Pulling fs layer Step #4: 2a388822eb2b: Pulling fs layer Step #4: 4fab6dfbfc24: Pulling fs layer Step #4: 0e1c613a0cd4: Pulling fs layer Step #4: 3d9eb7ed8868: Pulling fs layer Step #4: d20a46bade7a: Pulling fs layer Step #4: 2b995aa0c50b: Pulling fs layer Step #4: 98092a1e61e3: Pulling fs layer Step #4: 5441ae436f04: Pulling fs layer Step #4: 3aa84dd48b9b: Pulling fs layer Step #4: 7ebf0a826696: Pulling fs layer Step #4: 958797a5bd3e: Pulling fs layer Step #4: 90c1dc49f985: Pulling fs layer Step #4: 2a388822eb2b: Waiting Step #4: 4fab6dfbfc24: Waiting Step #4: 0e1c613a0cd4: Waiting Step #4: 3d9eb7ed8868: Waiting Step #4: d20a46bade7a: Waiting Step #4: 2b995aa0c50b: Waiting Step #4: 98092a1e61e3: Waiting Step #4: 5441ae436f04: Waiting Step #4: 3aa84dd48b9b: Waiting Step #4: 7ebf0a826696: Waiting Step #4: 958797a5bd3e: Waiting Step #4: 90c1dc49f985: Waiting Step #4: eea94528a1e5: Waiting Step #4: 0cbd83c6ac1e: Waiting Step #4: 1d2d5605ff9b: Waiting Step #4: c08894e66519: Waiting Step #4: 060c2d82682b: Waiting Step #4: 46950c600e29: Waiting Step #4: d8127736e2f1: Verifying Checksum Step #4: d8127736e2f1: Download complete Step #4: f8c1f2e758d2: Verifying Checksum Step #4: f8c1f2e758d2: Download complete Step #4: 2815e0ad7463: Verifying Checksum Step #4: 2815e0ad7463: Download complete Step #4: bd02e9895020: Verifying Checksum Step #4: bd02e9895020: Download complete Step #4: 060c2d82682b: Verifying Checksum Step #4: 060c2d82682b: Download complete Step #4: 0cbd83c6ac1e: Verifying Checksum Step #4: 0cbd83c6ac1e: Download complete Step #4: c347ec8e6852: Verifying Checksum Step #4: c347ec8e6852: Download complete Step #4: eea94528a1e5: Download complete Step #4: 2815e0ad7463: Pull complete Step #4: 46950c600e29: Verifying Checksum Step #4: 46950c600e29: Download complete Step #4: 2a388822eb2b: Verifying Checksum Step #4: 2a388822eb2b: Download complete Step #4: c08894e66519: Verifying Checksum Step #4: c08894e66519: Download complete Step #4: 0e1c613a0cd4: Verifying Checksum Step #4: 0e1c613a0cd4: Download complete Step #4: 30d46b657234: Verifying Checksum Step #4: 30d46b657234: Download complete Step #4: d20a46bade7a: Verifying Checksum Step #4: d20a46bade7a: Download complete Step #4: c347ec8e6852: Pull complete Step #4: d8127736e2f1: Pull complete Step #4: 2b995aa0c50b: Download complete Step #4: 3aa84dd48b9b: Verifying Checksum Step #4: 3aa84dd48b9b: Download complete Step #4: 5441ae436f04: Verifying Checksum Step #4: 5441ae436f04: Download complete Step #4: 1d2d5605ff9b: Download complete Step #4: bd02e9895020: Pull complete Step #4: 958797a5bd3e: Verifying Checksum Step #4: 958797a5bd3e: Download complete Step #4: 90c1dc49f985: Verifying Checksum Step #4: 90c1dc49f985: Download complete Step #4: f8c1f2e758d2: Pull complete Step #4: 7ebf0a826696: Verifying Checksum Step #4: 7ebf0a826696: Download complete Step #4: 98092a1e61e3: Verifying Checksum Step #4: 98092a1e61e3: Download complete Step #4: 4fab6dfbfc24: Verifying Checksum Step #4: 4fab6dfbfc24: Download complete Step #4: 3d9eb7ed8868: Verifying Checksum Step #4: 3d9eb7ed8868: Download complete Step #4: 30d46b657234: Pull complete Step #4: 060c2d82682b: Pull complete Step #4: 0cbd83c6ac1e: Pull complete Step #4: eea94528a1e5: Pull complete Step #4: 1d2d5605ff9b: Pull complete Step #4: c08894e66519: Pull complete Step #4: 46950c600e29: Pull complete Step #4: 2a388822eb2b: Pull complete Step #4: 4fab6dfbfc24: Pull complete Step #4: 0e1c613a0cd4: Pull complete Step #4: 3d9eb7ed8868: Pull complete Step #4: d20a46bade7a: Pull complete Step #4: 2b995aa0c50b: Pull complete Step #4: 98092a1e61e3: Pull complete Step #4: 5441ae436f04: Pull complete Step #4: 3aa84dd48b9b: Pull complete Step #4: 7ebf0a826696: Pull complete Step #4: 958797a5bd3e: Pull complete Step #4: 90c1dc49f985: Pull complete Step #4: Digest: sha256:0834995fd466ae42331a93b9c5c4a2522207fc3403cb1c1212136c3eddd2e5a4 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzParseSignedBytes Step #5: Running go target FuzzDecoder Step #5: Running go target FuzzParser Step #5: Running go target FuzzNewEndpoint Step #5: Running go target FuzzPatchDelta Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/12/06 06:30:48 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/12/06 06:30:48 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 63e5bc7682b8: Pulling fs layer Step #6: 2d8843b6fd75: Pulling fs layer Step #6: 069f9fef7429: Pulling fs layer Step #6: 6d3892323374: Pulling fs layer Step #6: 7111427d8489: Pulling fs layer Step #6: 134676fbdbfc: Pulling fs layer Step #6: 16d1ee2e1334: Pulling fs layer Step #6: da8ed20acc09: Pulling fs layer Step #6: 16d1ee2e1334: Waiting Step #6: da8ed20acc09: Waiting Step #6: 134676fbdbfc: Verifying Checksum Step #6: 134676fbdbfc: Download complete Step #6: 7111427d8489: Download complete Step #6: 069f9fef7429: Verifying Checksum Step #6: 2d8843b6fd75: Download complete Step #6: 069f9fef7429: Download complete Step #6: da8ed20acc09: Verifying Checksum Step #6: da8ed20acc09: Download complete Step #6: 16d1ee2e1334: Verifying Checksum Step #6: 16d1ee2e1334: Download complete Step #6: 63e5bc7682b8: Verifying Checksum Step #6: 63e5bc7682b8: Download complete Step #6: 63e5bc7682b8: Pull complete Step #6: 2d8843b6fd75: Pull complete Step #6: 069f9fef7429: Pull complete Step #6: 6d3892323374: Verifying Checksum Step #6: 6d3892323374: Download complete Step #6: 6d3892323374: Pull complete Step #6: 7111427d8489: Pull complete Step #6: 134676fbdbfc: Pull complete Step #6: 16d1ee2e1334: Pull complete Step #6: da8ed20acc09: Pull complete Step #6: Digest: sha256:cc3b6a148de154f2a6d992a1b0a3876e8e4c9996e71c2a3c8f505eee3fc0448d Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 1.0 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 1.0 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][531.6 KiB/ 1.0 MiB] 51% Done / [1/3 files][ 1.0 MiB/ 1.0 MiB] 99% Done / [2/3 files][ 1.0 MiB/ 1.0 MiB] 99% Done / [3/3 files][ 1.0 MiB/ 1.0 MiB] 100% Done Step #7: Operation completed over 3 objects/1.0 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzParser.json [Content-Type=application/json]... Step #9: / [0/6 files][ 0.0 B/ 30.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDecoder.json [Content-Type=application/json]... Step #9: / [0/6 files][ 0.0 B/ 30.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzNewEndpoint.json [Content-Type=application/json]... Step #9: / [0/6 files][ 0.0 B/ 30.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzPatchDelta.json [Content-Type=application/json]... Step #9: / [0/6 files][ 0.0 B/ 30.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [0/6 files][ 0.0 B/ 30.0 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzParseSignedBytes.json [Content-Type=application/json]... Step #9: / [0/6 files][ 20.8 KiB/ 30.0 KiB] 69% Done / [1/6 files][ 20.8 KiB/ 30.0 KiB] 69% Done / [2/6 files][ 30.0 KiB/ 30.0 KiB] 99% Done / [3/6 files][ 30.0 KiB/ 30.0 KiB] 99% Done / [4/6 files][ 30.0 KiB/ 30.0 KiB] 99% Done / [5/6 files][ 30.0 KiB/ 30.0 KiB] 99% Done / [6/6 files][ 30.0 KiB/ 30.0 KiB] 100% Done Step #9: Operation completed over 6 objects/30.0 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzNewEndpoint.log [Content-Type=application/octet-stream]... Step #11: / [0/5 files][ 0.0 B/ 341.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzParseSignedBytes.log [Content-Type=application/octet-stream]... Step #11: / [0/5 files][ 0.0 B/ 341.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzPatchDelta.log [Content-Type=application/octet-stream]... Step #11: / [0/5 files][ 0.0 B/ 341.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzParser.log [Content-Type=application/octet-stream]... Step #11: / [0/5 files][ 0.0 B/ 341.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDecoder.log [Content-Type=application/octet-stream]... Step #11: / [0/5 files][ 0.0 B/ 341.0 B] 0% Done / [1/5 files][ 341.0 B/ 341.0 B] 99% Done / [2/5 files][ 341.0 B/ 341.0 B] 99% Done / [3/5 files][ 341.0 B/ 341.0 B] 99% Done / [4/5 files][ 341.0 B/ 341.0 B] 99% Done / [5/5 files][ 341.0 B/ 341.0 B] 100% Done Step #11: Operation completed over 5 objects/341.0 B. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 347.0 B] / [1 files][ 347.0 B/ 347.0 B] Step #12: Operation completed over 1 objects/347.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 306 0 0 100 306 0 1545 --:--:-- --:--:-- --:--:-- 1545 100 306 0 0 100 306 0 1545 --:--:-- --:--:-- --:--:-- 1545 Finished Step #13 PUSH DONE