starting build "23413d7e-2127-46dd-a587-e8af6754a2e2" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go-codeintelligencetesting Step #1: latest: Pulling from oss-fuzz-base/base-builder-go-codeintelligencetesting Step #1: 7c3b88808835: Already exists Step #1: 5cacf886223c: Pulling fs layer Step #1: df4ab0605df5: Pulling fs layer Step #1: 6c53518a5323: Pulling fs layer Step #1: c97e86a08b71: Pulling fs layer Step #1: 6b9c5fed7df7: Pulling fs layer Step #1: 8158f7758fbf: Pulling fs layer Step #1: 345d0b8b98ee: Pulling fs layer Step #1: f9a81bce6f9d: Pulling fs layer Step #1: dda1e36bc1f4: Pulling fs layer Step #1: b543f2133ddd: Pulling fs layer Step #1: 76a5e4944988: Pulling fs layer Step #1: 0ce8623595e3: Pulling fs layer Step #1: 93c9766249e4: Pulling fs layer Step #1: cc4461529439: Pulling fs layer Step #1: 21b146f8d1b2: Pulling fs layer Step #1: 8158f7758fbf: Waiting Step #1: 10853856dab0: Pulling fs layer Step #1: c97e86a08b71: Waiting Step #1: 345d0b8b98ee: Waiting Step #1: 6b9c5fed7df7: Waiting Step #1: dda1e36bc1f4: Waiting Step #1: b543f2133ddd: Waiting Step #1: 0ce8623595e3: Waiting Step #1: 32bca3d50113: Pulling fs layer Step #1: 128893a2e0b0: Pulling fs layer Step #1: f9a81bce6f9d: Waiting Step #1: 8c8228e47e0c: Pulling fs layer Step #1: eef392b7026b: Pulling fs layer Step #1: 4d8abb124ce7: Pulling fs layer Step #1: e9ff701e33ae: Pulling fs layer Step #1: 32bca3d50113: Waiting Step #1: 93c9766249e4: Waiting Step #1: 76a5e4944988: Waiting Step #1: eef392b7026b: Waiting Step #1: 8c8228e47e0c: Waiting Step #1: cc4461529439: Waiting Step #1: 10853856dab0: Waiting Step #1: 4d8abb124ce7: Waiting Step #1: 492c0a7fe094: Pulling fs layer Step #1: e9ff701e33ae: Waiting Step #1: b1e02858ed33: Pulling fs layer Step #1: 492c0a7fe094: Waiting Step #1: b1e02858ed33: Waiting Step #1: df4ab0605df5: Verifying Checksum Step #1: df4ab0605df5: Download complete Step #1: 6c53518a5323: Verifying Checksum Step #1: 6c53518a5323: Download complete Step #1: c97e86a08b71: Verifying Checksum Step #1: c97e86a08b71: Download complete Step #1: 6b9c5fed7df7: Verifying Checksum Step #1: 6b9c5fed7df7: Download complete Step #1: 345d0b8b98ee: Download complete Step #1: 5cacf886223c: Verifying Checksum Step #1: 5cacf886223c: Download complete Step #1: dda1e36bc1f4: Verifying Checksum Step #1: dda1e36bc1f4: Download complete Step #1: b543f2133ddd: Verifying Checksum Step #1: b543f2133ddd: Download complete Step #1: 76a5e4944988: Verifying Checksum Step #1: 76a5e4944988: Download complete Step #1: 5cacf886223c: Pull complete Step #1: df4ab0605df5: Pull complete Step #1: 0ce8623595e3: Verifying Checksum Step #1: 0ce8623595e3: Download complete Step #1: f9a81bce6f9d: Verifying Checksum Step #1: f9a81bce6f9d: Download complete Step #1: 93c9766249e4: Verifying Checksum Step #1: 93c9766249e4: Download complete Step #1: cc4461529439: Verifying Checksum Step #1: cc4461529439: Download complete Step #1: 21b146f8d1b2: Verifying Checksum Step #1: 21b146f8d1b2: Download complete Step #1: 10853856dab0: Verifying Checksum Step #1: 10853856dab0: Download complete Step #1: 8158f7758fbf: Verifying Checksum Step #1: 8158f7758fbf: Download complete Step #1: 128893a2e0b0: Verifying Checksum Step #1: 128893a2e0b0: Download complete Step #1: 32bca3d50113: Verifying Checksum Step #1: 32bca3d50113: Download complete Step #1: 8c8228e47e0c: Verifying Checksum Step #1: 8c8228e47e0c: Download complete Step #1: eef392b7026b: Verifying Checksum Step #1: eef392b7026b: Download complete Step #1: 4d8abb124ce7: Verifying Checksum Step #1: 4d8abb124ce7: Download complete Step #1: 492c0a7fe094: Verifying Checksum Step #1: 492c0a7fe094: Download complete Step #1: 6c53518a5323: Pull complete Step #1: c97e86a08b71: Pull complete Step #1: 6b9c5fed7df7: Pull complete Step #1: b1e02858ed33: Download complete Step #1: e9ff701e33ae: Verifying Checksum Step #1: e9ff701e33ae: Download complete Step #1: 8158f7758fbf: Pull complete Step #1: 345d0b8b98ee: Pull complete Step #1: f9a81bce6f9d: Pull complete Step #1: dda1e36bc1f4: Pull complete Step #1: b543f2133ddd: Pull complete Step #1: 76a5e4944988: Pull complete Step #1: 0ce8623595e3: Pull complete Step #1: 93c9766249e4: Pull complete Step #1: cc4461529439: Pull complete Step #1: 21b146f8d1b2: Pull complete Step #1: 10853856dab0: Pull complete Step #1: 32bca3d50113: Pull complete Step #1: 128893a2e0b0: Pull complete Step #1: 8c8228e47e0c: Pull complete Step #1: eef392b7026b: Pull complete Step #1: 4d8abb124ce7: Pull complete Step #1: e9ff701e33ae: Pull complete Step #1: 492c0a7fe094: Pull complete Step #1: b1e02858ed33: Pull complete Step #1: Digest: sha256:b4daab874ff0f716df8874d972d4f7e9828057996bbee2097223ee45bc751e43 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go-codeintelligencetesting:latest Step #1: ---> b99ec129510f Step #1: Step 2/5 : RUN git clone https://github.com/google/gvisor Step #1: ---> Running in 918e6878fca3 Step #1: Cloning into 'gvisor'... Step #1: Removing intermediate container 918e6878fca3 Step #1: ---> 6e450d157e17 Step #1: Step 3/5 : COPY build.sh state_fuzzer.go $SRC/ Step #1: ---> 63c8b7a1fa31 Step #1: Step 4/5 : ENV GVISOR_ROOT $SRC/gvisor Step #1: ---> Running in 1bb546498c26 Step #1: Removing intermediate container 1bb546498c26 Step #1: ---> 7e4d3d4fe792 Step #1: Step 5/5 : WORKDIR $GVISOR_ROOT Step #1: ---> Running in e4d81332daaa Step #1: Removing intermediate container e4d81332daaa Step #1: ---> 37c31260c369 Step #1: Successfully built 37c31260c369 Step #1: Successfully tagged gcr.io/oss-fuzz/gvisor:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gvisor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filedAzAXM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gvisor/.git Step #2 - "srcmap": + GIT_DIR=/src/gvisor Step #2 - "srcmap": + cd /src/gvisor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gvisor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=24cef0a622bb99fdfafe7898679a95a2a974b499 Step #2 - "srcmap": + jq_inplace /tmp/filedAzAXM '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "24cef0a622bb99fdfafe7898679a95a2a974b499" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filekjYBp9 Step #2 - "srcmap": + cat /tmp/filedAzAXM Step #2 - "srcmap": + jq '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "24cef0a622bb99fdfafe7898679a95a2a974b499" }' Step #2 - "srcmap": + mv /tmp/filekjYBp9 /tmp/filedAzAXM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/aflplusplus/.git Step #2 - "srcmap": + GIT_DIR=/src/aflplusplus Step #2 - "srcmap": + cd /src/aflplusplus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=550ba4d77294e61597a5259d00769c61281e0042 Step #2 - "srcmap": + jq_inplace /tmp/filedAzAXM '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "550ba4d77294e61597a5259d00769c61281e0042" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileFHiHBK Step #2 - "srcmap": + cat /tmp/filedAzAXM Step #2 - "srcmap": + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "550ba4d77294e61597a5259d00769c61281e0042" }' Step #2 - "srcmap": + mv /tmp/fileFHiHBK /tmp/filedAzAXM Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filedAzAXM Step #2 - "srcmap": + rm /tmp/filedAzAXM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gvisor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gvisor", Step #2 - "srcmap": "rev": "24cef0a622bb99fdfafe7898679a95a2a974b499" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/aflplusplus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2 - "srcmap": "rev": "550ba4d77294e61597a5259d00769c61281e0042" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image: gcr.io/oss-fuzz/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Zinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + git checkout go Step #3 - "compile-libfuzzer-coverage-x86_64": Switched to a new branch 'go' Step #3 - "compile-libfuzzer-coverage-x86_64": branch 'go' set up to track 'origin/go'. Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/state_fuzzer.go /src/gvisor/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer gvisor.dev/gvisor FuzzStateLoad state_load_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/gvisor.dev/gvisor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20211019181941-9d821ace8654 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bazelbuild/rules_go v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.0.0-20191024005414-555d28b269f0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd v1.3.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.42.0-dev.0.20211020220737-f00baa6c3c84 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.0.3-0.20211123151946-c2389c3cb60a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/subcommands v1.0.2-0.20190508160503-636abe8753b8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pty v1.1.4-0.20190131011033-7dc38fb350b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff v1.1.1-0.20190506075156-2146c9339422 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20180916011248-d98352740cb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.0.1-0.20190930145447-2ec5bdc52b86 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mohae/deepcopy v0.0.0-20170308212314-bb9b5e7adda9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gofrs/flock v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.16.14-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.16.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattbaird/jsonpatch v0.0.0-20171005235357-81af80346b1a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.16.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bits-and-blooms/bitset v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.0.0-20210220032951-036812b2e83c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.0-20211101163701-50045581ed74 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.8.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runc v1.0.0-rc90 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gnostic v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools v2.2.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20190522114515-bc1a522cf7b1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.11.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20190801114015-581e00157fb1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.0.0-20211005180243-6b3c2da341f1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/appengine v1.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd v0.0.0-20190321100706-95778dfbb74e Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: 7c3b88808835: Already exists Step #4: 5cacf886223c: Already exists Step #4: df4ab0605df5: Already exists Step #4: b4b315bd9d3b: Pulling fs layer Step #4: a0e1ec07f585: Pulling fs layer Step #4: 84aa693f2f6e: Pulling fs layer Step #4: 6fc208115272: Pulling fs layer Step #4: bdcd674587d0: Pulling fs layer Step #4: 9ffc4cada1f1: Pulling fs layer Step #4: 9a8b98ae3609: Pulling fs layer Step #4: c1a45ee277ff: Pulling fs layer Step #4: b4c3b8468add: Pulling fs layer Step #4: 07666ccd321f: Pulling fs layer Step #4: 264f781c5019: Pulling fs layer Step #4: c1a45ee277ff: Waiting Step #4: 6fc208115272: Waiting Step #4: 9a8b98ae3609: Waiting Step #4: b4c3b8468add: Waiting Step #4: 9ffc4cada1f1: Waiting Step #4: bdcd674587d0: Waiting Step #4: 264f781c5019: Waiting Step #4: b4b315bd9d3b: Download complete Step #4: a0e1ec07f585: Verifying Checksum Step #4: a0e1ec07f585: Download complete Step #4: 6fc208115272: Verifying Checksum Step #4: 6fc208115272: Download complete Step #4: b4b315bd9d3b: Pull complete Step #4: bdcd674587d0: Verifying Checksum Step #4: bdcd674587d0: Download complete Step #4: 9a8b98ae3609: Download complete Step #4: a0e1ec07f585: Pull complete Step #4: 84aa693f2f6e: Verifying Checksum Step #4: 84aa693f2f6e: Download complete Step #4: c1a45ee277ff: Verifying Checksum Step #4: c1a45ee277ff: Download complete Step #4: 07666ccd321f: Verifying Checksum Step #4: 07666ccd321f: Download complete Step #4: 264f781c5019: Verifying Checksum Step #4: 264f781c5019: Download complete Step #4: b4c3b8468add: Verifying Checksum Step #4: b4c3b8468add: Download complete Step #4: 9ffc4cada1f1: Verifying Checksum Step #4: 9ffc4cada1f1: Download complete Step #4: 84aa693f2f6e: Pull complete Step #4: 6fc208115272: Pull complete Step #4: bdcd674587d0: Pull complete Step #4: 9ffc4cada1f1: Pull complete Step #4: 9a8b98ae3609: Pull complete Step #4: c1a45ee277ff: Pull complete Step #4: b4c3b8468add: Pull complete Step #4: 07666ccd321f: Pull complete Step #4: 264f781c5019: Pull complete Step #4: Digest: sha256:e3f3976db621f2b5feb64778cc334c8f41839b224d9af08ffb682513070e12a8 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target state_load_fuzz Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/state_load_fuzz.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/state_load_fuzz.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/state_load_fuzz.profdata: No such file or directory Step #5: 2022/03/18 10:53:39 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/state_load_fuzz.profdata: no such file or directory Step #5: 2022/03/18 10:53:39 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2022/03/18 10:53:39 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/state_load_fuzz.perf.cpu.prof": parsing profile: empty input file Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2022/03/18 10:53:39 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.5 KiB] 0% Done / [0/3 files][ 0.0 B/ 4.5 KiB] 0% Done / [0/3 files][ 0.0 B/ 4.5 KiB] 0% Done / [1/3 files][ 4.5 KiB/ 4.5 KiB] 99% Done / [2/3 files][ 4.5 KiB/ 4.5 KiB] 99% Done / [3/3 files][ 4.5 KiB/ 4.5 KiB] 100% Done Step #7: Operation completed over 3 objects/4.5 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: CommandException: No URLs matched. Do the files you're operating on exist? Finished Step #9 ERROR ERROR: build step 9 "gcr.io/cloud-builders/gsutil" failed: step exited with non-zero status: 1