starting build "32916828-3a86-4d0f-b340-a288b3aac28f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Already exists Step #1: 3b90acf2745d: Pulling fs layer Step #1: 24acc32b27bf: Pulling fs layer Step #1: a97116b150dc: Pulling fs layer Step #1: ed71fa19e8ab: Pulling fs layer Step #1: 79f1ef43ca04: Pulling fs layer Step #1: 4bc13b8fc157: Pulling fs layer Step #1: 57e0eb65e820: Pulling fs layer Step #1: 519123cb280c: Pulling fs layer Step #1: 46b37109c16e: Pulling fs layer Step #1: 886b8ac656be: Pulling fs layer Step #1: 02e71dec9f94: Pulling fs layer Step #1: fb87e9a33e64: Pulling fs layer Step #1: 318d732432cb: Pulling fs layer Step #1: 54bb811194e5: Pulling fs layer Step #1: 512dc06d8109: Pulling fs layer Step #1: edfa9e0db31d: Pulling fs layer Step #1: b84433305916: Pulling fs layer Step #1: 2dbb30a89b5e: Pulling fs layer Step #1: 885b4723cb80: Pulling fs layer Step #1: df90346db4a2: Pulling fs layer Step #1: 3fed72cc865a: Pulling fs layer Step #1: 36f73f478803: Pulling fs layer Step #1: 3f98f6063260: Pulling fs layer Step #1: 645130296236: Pulling fs layer Step #1: 41e56b4d7862: Pulling fs layer Step #1: b9587dc2d8d4: Pulling fs layer Step #1: 2d49f3884873: Pulling fs layer Step #1: 8049f7c9b8b8: Pulling fs layer Step #1: ed71fa19e8ab: Waiting Step #1: 79f1ef43ca04: Waiting Step #1: 4bc13b8fc157: Waiting Step #1: 2dbb30a89b5e: Waiting Step #1: 57e0eb65e820: Waiting Step #1: 885b4723cb80: Waiting Step #1: 519123cb280c: Waiting Step #1: df90346db4a2: Waiting Step #1: 46b37109c16e: Waiting Step #1: 3fed72cc865a: Waiting Step #1: 886b8ac656be: Waiting Step #1: 36f73f478803: Waiting Step #1: 3f98f6063260: Waiting Step #1: 02e71dec9f94: Waiting Step #1: 645130296236: Waiting Step #1: fb87e9a33e64: Waiting Step #1: 41e56b4d7862: Waiting Step #1: 318d732432cb: Waiting Step #1: b9587dc2d8d4: Waiting Step #1: 54bb811194e5: Waiting Step #1: 2d49f3884873: Waiting Step #1: 512dc06d8109: Waiting Step #1: edfa9e0db31d: Waiting Step #1: 8049f7c9b8b8: Waiting Step #1: b84433305916: Waiting Step #1: 24acc32b27bf: Verifying Checksum Step #1: 24acc32b27bf: Download complete Step #1: ed71fa19e8ab: Verifying Checksum Step #1: ed71fa19e8ab: Download complete Step #1: 79f1ef43ca04: Download complete Step #1: 3b90acf2745d: Verifying Checksum Step #1: 3b90acf2745d: Download complete Step #1: 57e0eb65e820: Download complete Step #1: a97116b150dc: Verifying Checksum Step #1: a97116b150dc: Download complete Step #1: 519123cb280c: Verifying Checksum Step #1: 519123cb280c: Download complete Step #1: 886b8ac656be: Verifying Checksum Step #1: 886b8ac656be: Download complete Step #1: 02e71dec9f94: Verifying Checksum Step #1: 02e71dec9f94: Download complete Step #1: fb87e9a33e64: Verifying Checksum Step #1: fb87e9a33e64: Download complete Step #1: 318d732432cb: Download complete Step #1: 54bb811194e5: Verifying Checksum Step #1: 54bb811194e5: Download complete Step #1: 46b37109c16e: Verifying Checksum Step #1: 46b37109c16e: Download complete Step #1: 512dc06d8109: Verifying Checksum Step #1: 512dc06d8109: Download complete Step #1: edfa9e0db31d: Verifying Checksum Step #1: edfa9e0db31d: Download complete Step #1: b84433305916: Verifying Checksum Step #1: 2dbb30a89b5e: Verifying Checksum Step #1: 2dbb30a89b5e: Download complete Step #1: 885b4723cb80: Verifying Checksum Step #1: 885b4723cb80: Download complete Step #1: df90346db4a2: Download complete Step #1: 36f73f478803: Verifying Checksum Step #1: 36f73f478803: Download complete Step #1: 3fed72cc865a: Verifying Checksum Step #1: 3fed72cc865a: Download complete Step #1: 3f98f6063260: Verifying Checksum Step #1: 3f98f6063260: Download complete Step #1: 645130296236: Download complete Step #1: 41e56b4d7862: Verifying Checksum Step #1: 41e56b4d7862: Download complete Step #1: 4bc13b8fc157: Verifying Checksum Step #1: b9587dc2d8d4: Verifying Checksum Step #1: b9587dc2d8d4: Download complete Step #1: 8049f7c9b8b8: Verifying Checksum Step #1: 8049f7c9b8b8: Download complete Step #1: 3b90acf2745d: Pull complete Step #1: 24acc32b27bf: Pull complete Step #1: a97116b150dc: Pull complete Step #1: 2d49f3884873: Verifying Checksum Step #1: 2d49f3884873: Download complete Step #1: ed71fa19e8ab: Pull complete Step #1: 79f1ef43ca04: Pull complete Step #1: 4bc13b8fc157: Pull complete Step #1: 57e0eb65e820: Pull complete Step #1: 519123cb280c: Pull complete Step #1: 46b37109c16e: Pull complete Step #1: 886b8ac656be: Pull complete Step #1: 02e71dec9f94: Pull complete Step #1: fb87e9a33e64: Pull complete Step #1: 318d732432cb: Pull complete Step #1: 54bb811194e5: Pull complete Step #1: 512dc06d8109: Pull complete Step #1: edfa9e0db31d: Pull complete Step #1: b84433305916: Pull complete Step #1: 2dbb30a89b5e: Pull complete Step #1: 885b4723cb80: Pull complete Step #1: df90346db4a2: Pull complete Step #1: 3fed72cc865a: Pull complete Step #1: 36f73f478803: Pull complete Step #1: 3f98f6063260: Pull complete Step #1: 645130296236: Pull complete Step #1: 41e56b4d7862: Pull complete Step #1: b9587dc2d8d4: Pull complete Step #1: 2d49f3884873: Pull complete Step #1: 8049f7c9b8b8: Pull complete Step #1: Digest: sha256:c9022ab5b881f6440c5b0ae00fc55d491902078123d8d3045c183df914b9d4cf Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 9514b301a06c Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/google/uuid Step #1: ---> Running in 0e849f2318b0 Step #1: Cloning into 'uuid'... Step #1: Removing intermediate container 0e849f2318b0 Step #1: ---> f1f0df910d77 Step #1: Step 3/4 : WORKDIR $SRC/uuid Step #1: ---> Running in 8eeca3e4c3df Step #1: Removing intermediate container 8eeca3e4c3df Step #1: ---> 42e280b9d5d7 Step #1: Step 4/4 : COPY build.sh fuzz_test.go $SRC/ Step #1: ---> cceb7fdaab11 Step #1: Successfully built cceb7fdaab11 Step #1: Successfully tagged gcr.io/oss-fuzz/google-uuid:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/google-uuid Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileXdHT5M Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/uuid/.git Step #2 - "srcmap": + GIT_DIR=/src/uuid Step #2 - "srcmap": + cd /src/uuid Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/uuid Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=44b5fee7c49cf3bcdf723f106b36d56ef13ccc88 Step #2 - "srcmap": + jq_inplace /tmp/fileXdHT5M '."/src/uuid" = { type: "git", url: "https://github.com/google/uuid", rev: "44b5fee7c49cf3bcdf723f106b36d56ef13ccc88" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filerxqw6c Step #2 - "srcmap": + cat /tmp/fileXdHT5M Step #2 - "srcmap": + jq '."/src/uuid" = { type: "git", url: "https://github.com/google/uuid", rev: "44b5fee7c49cf3bcdf723f106b36d56ef13ccc88" }' Step #2 - "srcmap": + mv /tmp/filerxqw6c /tmp/fileXdHT5M Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileXdHT5M Step #2 - "srcmap": + rm /tmp/fileXdHT5M Step #2 - "srcmap": { Step #2 - "srcmap": "/src/uuid": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/uuid", Step #2 - "srcmap": "rev": "44b5fee7c49cf3bcdf723f106b36d56ef13ccc88" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/fuzz_test.go ./ Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package uuid\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20221206110420-d395f97c4830 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/google/uuid FuzzParseBytes FuzzParseBytes Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 3b90acf2745d: Already exists Step #4: 24acc32b27bf: Already exists Step #4: 14141f910713: Pulling fs layer Step #4: cd133c2b634c: Pulling fs layer Step #4: bc2f23a918c0: Pulling fs layer Step #4: fcc991791756: Pulling fs layer Step #4: b5811e0e4acd: Pulling fs layer Step #4: b078c3bc684f: Pulling fs layer Step #4: f85435dfac81: Pulling fs layer Step #4: df4d9a4ae750: Pulling fs layer Step #4: 1a9774f4a973: Pulling fs layer Step #4: 3a3d8b2a4c26: Pulling fs layer Step #4: 8dc4788530ad: Pulling fs layer Step #4: 26414f3c3c50: Pulling fs layer Step #4: 77965dd5d485: Pulling fs layer Step #4: 33fa3b15da4f: Pulling fs layer Step #4: f85435dfac81: Waiting Step #4: df4d9a4ae750: Waiting Step #4: 1a9774f4a973: Waiting Step #4: 3a3d8b2a4c26: Waiting Step #4: 8dc4788530ad: Waiting Step #4: 26414f3c3c50: Waiting Step #4: 77965dd5d485: Waiting Step #4: 33fa3b15da4f: Waiting Step #4: fcc991791756: Waiting Step #4: b5811e0e4acd: Waiting Step #4: b078c3bc684f: Waiting Step #4: bc2f23a918c0: Verifying Checksum Step #4: bc2f23a918c0: Download complete Step #4: cd133c2b634c: Verifying Checksum Step #4: cd133c2b634c: Download complete Step #4: b5811e0e4acd: Verifying Checksum Step #4: b5811e0e4acd: Download complete Step #4: 14141f910713: Verifying Checksum Step #4: 14141f910713: Download complete Step #4: f85435dfac81: Verifying Checksum Step #4: f85435dfac81: Download complete Step #4: b078c3bc684f: Verifying Checksum Step #4: b078c3bc684f: Download complete Step #4: 1a9774f4a973: Verifying Checksum Step #4: 1a9774f4a973: Download complete Step #4: 14141f910713: Pull complete Step #4: df4d9a4ae750: Verifying Checksum Step #4: df4d9a4ae750: Download complete Step #4: 8dc4788530ad: Verifying Checksum Step #4: 8dc4788530ad: Download complete Step #4: 26414f3c3c50: Download complete Step #4: cd133c2b634c: Pull complete Step #4: fcc991791756: Download complete Step #4: 33fa3b15da4f: Verifying Checksum Step #4: 33fa3b15da4f: Download complete Step #4: bc2f23a918c0: Pull complete Step #4: 3a3d8b2a4c26: Verifying Checksum Step #4: 3a3d8b2a4c26: Download complete Step #4: 77965dd5d485: Verifying Checksum Step #4: 77965dd5d485: Download complete Step #4: fcc991791756: Pull complete Step #4: b5811e0e4acd: Pull complete Step #4: b078c3bc684f: Pull complete Step #4: f85435dfac81: Pull complete Step #4: df4d9a4ae750: Pull complete Step #4: 1a9774f4a973: Pull complete Step #4: 3a3d8b2a4c26: Pull complete Step #4: 8dc4788530ad: Pull complete Step #4: 26414f3c3c50: Pull complete Step #4: 77965dd5d485: Pull complete Step #4: 33fa3b15da4f: Pull complete Step #4: Digest: sha256:0a0acca5a1100589028054e23285e99eccb09b95b0978db3e2768ff98d5f0c45 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/FuzzParseBytes.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzParseBytes.zip or Step #5: /corpus/FuzzParseBytes.zip.zip, and cannot find /corpus/FuzzParseBytes.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzParseBytes. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image google-uuid Step #5: python infra/helper.py build_fuzzers --sanitizer coverage google-uuid Step #5: python infra/helper.py coverage google-uuid Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1