starting build "39bb1411-7d6d-449e-b7a1-d16e98947c8f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9" Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Sending build context to Docker daemon 10.75kB Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b549f31133a9: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b4985cbfa1: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e2c78405bbfa: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e9891046f21b: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b16452beab: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": a1c2bbf406fc: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d4ae0c967a52: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 7f22e22604df: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": cea8c1410696: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 1bf1ba590b89: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 66368804290e: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 22276f1f1557: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f53b68c71698: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 77b4e9971e7d: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d4ae0c967a52: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c09ac5a44944: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 7f22e22604df: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 8236f0355a84: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": fbd11ff89b8e: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 100b267fe340: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 1bf1ba590b89: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": cea8c1410696: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e7c6aed7d54c: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ea8bbe2ca172: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 22276f1f1557: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d1bbfd946983: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0dbe0ccb6fbd: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e0e1c4fb01f1: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b7859facdd94: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e3e08ee0ed0b: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d7e7ba51ed89: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c4e7bcb21464: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b68008ebcf2c: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0bdbae586c19: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 860de74ca10d: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 55ea6dd51172: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 88e231f62d4f: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d56db65dc1cf: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0ba050ccbfc3: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 3e1b96c4d1a5: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f4e28b1c49df: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 4193f38d9ef1: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 191c64861f60: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 77b4e9971e7d: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 2ffc2e8fe2ae: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": a1c2bbf406fc: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c09ac5a44944: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f53b68c71698: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0ba050ccbfc3: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 3e1b96c4d1a5: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e7c6aed7d54c: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ea8bbe2ca172: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b16452beab: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f4e28b1c49df: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 4193f38d9ef1: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 55ea6dd51172: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 8236f0355a84: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 88e231f62d4f: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 9452045ccdbe: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0dbe0ccb6fbd: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 64251eb116d0: Pulling fs layer Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0bdbae586c19: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 191c64861f60: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b7859facdd94: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 2ffc2e8fe2ae: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e0e1c4fb01f1: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 9452045ccdbe: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b68008ebcf2c: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e3e08ee0ed0b: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 64251eb116d0: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 66368804290e: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": fbd11ff89b8e: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d56db65dc1cf: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d1bbfd946983: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 860de74ca10d: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 100b267fe340: Waiting Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e2c78405bbfa: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b549f31133a9: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b549f31133a9: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b16452beab: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b16452beab: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e9891046f21b: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e9891046f21b: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d4ae0c967a52: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b4985cbfa1: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b4985cbfa1: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b549f31133a9: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 1bf1ba590b89: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 1bf1ba590b89: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 66368804290e: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 66368804290e: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 22276f1f1557: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 22276f1f1557: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f53b68c71698: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f53b68c71698: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 77b4e9971e7d: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 77b4e9971e7d: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c09ac5a44944: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c09ac5a44944: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": cea8c1410696: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": cea8c1410696: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 8236f0355a84: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": fbd11ff89b8e: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": fbd11ff89b8e: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 100b267fe340: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 100b267fe340: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e7c6aed7d54c: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e7c6aed7d54c: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ea8bbe2ca172: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ea8bbe2ca172: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d1bbfd946983: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d1bbfd946983: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0dbe0ccb6fbd: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0dbe0ccb6fbd: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b7859facdd94: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e0e1c4fb01f1: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e0e1c4fb01f1: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e3e08ee0ed0b: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e3e08ee0ed0b: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d7e7ba51ed89: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d7e7ba51ed89: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b68008ebcf2c: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b68008ebcf2c: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0bdbae586c19: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0bdbae586c19: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 860de74ca10d: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 860de74ca10d: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 55ea6dd51172: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 55ea6dd51172: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b4985cbfa1: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": a1c2bbf406fc: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": a1c2bbf406fc: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d56db65dc1cf: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 88e231f62d4f: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e2c78405bbfa: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0ba050ccbfc3: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0ba050ccbfc3: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f4e28b1c49df: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 3e1b96c4d1a5: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 3e1b96c4d1a5: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 2ffc2e8fe2ae: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 2ffc2e8fe2ae: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 4193f38d9ef1: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 4193f38d9ef1: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 191c64861f60: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 191c64861f60: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 64251eb116d0: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e9891046f21b: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 82b16452beab: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 9452045ccdbe: Verifying Checksum Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 9452045ccdbe: Download complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": a1c2bbf406fc: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d4ae0c967a52: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 7f22e22604df: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": cea8c1410696: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 1bf1ba590b89: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 66368804290e: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 22276f1f1557: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f53b68c71698: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 77b4e9971e7d: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c09ac5a44944: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 8236f0355a84: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": fbd11ff89b8e: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 100b267fe340: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e7c6aed7d54c: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ea8bbe2ca172: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d1bbfd946983: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0dbe0ccb6fbd: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e0e1c4fb01f1: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b7859facdd94: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": e3e08ee0ed0b: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d7e7ba51ed89: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": c4e7bcb21464: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": b68008ebcf2c: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0bdbae586c19: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 860de74ca10d: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 55ea6dd51172: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 88e231f62d4f: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": d56db65dc1cf: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 0ba050ccbfc3: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 3e1b96c4d1a5: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": f4e28b1c49df: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 4193f38d9ef1: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 191c64861f60: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 2ffc2e8fe2ae: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 9452045ccdbe: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": 64251eb116d0: Pull complete Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Digest: sha256:275f1866b9d52ffe20dfa23cea0b87ef39774a447ef4a014bc16af36febd244b Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> a425b73277d1 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 2/9 : ENV GOPATH="${GOPATH:-/root/go}" Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in c1bfe24e039f Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container c1bfe24e039f Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> af9907124734 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 3/9 : ENV ORG_ROOT="${GOPATH}/src/github.com/go-git" Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in 64b7891c5493 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container 64b7891c5493 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> 7544f9a7742c Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 4/9 : RUN mkdir -p "${ORG_ROOT}" Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in e9aa26d9bb70 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container e9aa26d9bb70 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> 162f6c87cf51 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 5/9 : ARG REPOSITORIES="go-git go-billy" Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in 15b62e9c61b8 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container 15b62e9c61b8 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> 0669feab2f65 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 6/9 : RUN for repo in ${REPOSITORIES}; do git clone --depth 1 "https://github.com/go-git/${repo}" "${ORG_ROOT}/${repo}"; cd "${ORG_ROOT}/${repo}"; go mod download; cd -; done Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in 1b20f8372de3 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Cloning into '/root/go/src/github.com/go-git/go-git'... Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": /src Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Cloning into '/root/go/src/github.com/go-git/go-billy'... Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": /src Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container 1b20f8372de3 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> 76b5c405c403 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 7/9 : RUN go install golang.org/x/tools/cmd/goimports@latest Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in 8f6edde8c76d Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": go: downloading golang.org/x/tools v0.38.0 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": go: downloading golang.org/x/telemetry v0.0.0-20251008203120-078029d740a8 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": go: downloading golang.org/x/sync v0.17.0 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": go: downloading golang.org/x/mod v0.29.0 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container 8f6edde8c76d Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> 90af7125f0e2 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 8/9 : COPY build.sh $SRC/ Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> f715901c53af Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Step 9/9 : WORKDIR $SRC Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> Running in cd4504d20dc3 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Removing intermediate container cd4504d20dc3 Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": ---> c2830cc73d6e Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Successfully built c2830cc73d6e Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Successfully tagged gcr.io/oss-fuzz/go-git:latest Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/go-git:latest Finished Step #1 - "build-e9ddda5e-88ae-487c-a1fe-99ee046116c9" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-git Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileKYKGbP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-billy/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-billy Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d6fa0e9346c195dd8096fc2cc63d3fee91ac9699 Step #2 - "srcmap": + jq_inplace /tmp/fileKYKGbP '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "d6fa0e9346c195dd8096fc2cc63d3fee91ac9699" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filee5302c Step #2 - "srcmap": + cat /tmp/fileKYKGbP Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "d6fa0e9346c195dd8096fc2cc63d3fee91ac9699" }' Step #2 - "srcmap": + mv /tmp/filee5302c /tmp/fileKYKGbP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-git/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-git Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-git Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=80b2f284a77983066b03ce9ec4cc1b7a6e685880 Step #2 - "srcmap": + jq_inplace /tmp/fileKYKGbP '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "80b2f284a77983066b03ce9ec4cc1b7a6e685880" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehiBKOI Step #2 - "srcmap": + cat /tmp/fileKYKGbP Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "80b2f284a77983066b03ce9ec4cc1b7a6e685880" }' Step #2 - "srcmap": + mv /tmp/filehiBKOI /tmp/fileKYKGbP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileKYKGbP Step #2 - "srcmap": + rm /tmp/fileKYKGbP Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-billy": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-billy", Step #2 - "srcmap": "rev": "d6fa0e9346c195dd8096fc2cc63d3fee91ac9699" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-git": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-git", Step #2 - "srcmap": "rev": "80b2f284a77983066b03ce9ec4cc1b7a6e685880" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + GOPATH=/root/go Step #3 - "compile-libfuzzer-coverage-x86_64": + ORG_ROOT=/root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + PREBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + POSTBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_postbuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + main Step #3 - "compile-libfuzzer-coverage-x86_64": + grep -h '^module github.com/go-git/' /src/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": grep: /src/go.mod: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Going through all repositories in /root/go/src/github.com/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": Going through all repositories in /root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + loop_through_org_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": + local repos= Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /root/go/src/github.com/go-git -type d -mindepth 1 -maxdepth 1 Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -mindepth after the argument -type, but global options are not positional, i.e., -mindepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -maxdepth after the argument -type, but global options are not positional, i.e., -maxdepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": + repos='/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/go-git/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules=. Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules=. Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- blame.go blame_test.go common.go common_test.go crypto.go doc.go example_test.go main_test.go object_walker.go options.go options_test.go prune.go prune_test.go remote.go remote_test.go repository.go repository_plan9_test.go repository_test.go repository_unix_test.go repository_windows_test.go signer.go signer_test.go status.go submodule.go submodule_test.go transport.go worktree.go worktree_bsd.go worktree_commit.go worktree_commit_test.go worktree_js.go worktree_linux.go worktree_plan9.go worktree_status.go worktree_status_test.go worktree_test.go worktree_unix_other.go worktree_windows.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package git' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/object/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparsesignedbytes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/object Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package object Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParseSignedBytes(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(openPGPSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(x509SignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(sshSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": parseSignedBytes(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/object FuzzParseSignedBytes FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/transport/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzznewendpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/transport Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package transport Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzNewEndpoint(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(_ *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": NewEndpoint(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/transport FuzzNewEndpoint FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/packfile/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzpatchdelta Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/packfile Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package packfile Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzPatchDelta(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\f\fsomenewvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0evalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0eva")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x80\x80\x80\x80\x80\x802\x7fvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input1, input2 []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": PatchDelta(input1, input2) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/packfile FuzzPatchDelta FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/config/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzdecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/config Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package config Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzDecoder(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": d := NewDecoder(bytes.NewReader(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": cfg := &Config{} Step #3 - "compile-libfuzzer-coverage-x86_64": d.Decode(cfg) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/config FuzzDecoder FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/revision/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparser Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/revision Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package revision Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParser(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@{2016-12-16T21:42:47Z}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@~3") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("v0.99.8^{}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("master:./README") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/fix nasty bug}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/fix nasty bug") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": parser := NewParser(bytes.NewBufferString(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": parser.Parse() Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/revision FuzzParser FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 82b4985cbfa1: Already exists Step #4: e2c78405bbfa: Already exists Step #4: ef2dfda34072: Pulling fs layer Step #4: 4a716d0a8853: Pulling fs layer Step #4: 05c4230a3e2d: Pulling fs layer Step #4: c9452c900323: Pulling fs layer Step #4: fbb1f50ce49e: Pulling fs layer Step #4: 53b45cbd7d3c: Pulling fs layer Step #4: bcb66fd3f3f4: Pulling fs layer Step #4: a88252db19c9: Pulling fs layer Step #4: 0e0ab7ce5454: Pulling fs layer Step #4: 7afce11c0328: Pulling fs layer Step #4: f669b1f58b23: Pulling fs layer Step #4: b393aff931c0: Pulling fs layer Step #4: eb373203f29c: Pulling fs layer Step #4: bcd3173489a9: Pulling fs layer Step #4: 818d357f89dc: Pulling fs layer Step #4: 3bf35587d70e: Pulling fs layer Step #4: ff9b3fdd3770: Pulling fs layer Step #4: dc1ef8a0708c: Pulling fs layer Step #4: 476887b9e4f2: Pulling fs layer Step #4: c878006fe4fe: Pulling fs layer Step #4: 5644dbe182f5: Pulling fs layer Step #4: fbb1f50ce49e: Waiting Step #4: e93eefb4ca22: Pulling fs layer Step #4: 611c16edb664: Pulling fs layer Step #4: 53b45cbd7d3c: Waiting Step #4: 0e0ab7ce5454: Waiting Step #4: 7afce11c0328: Waiting Step #4: bcb66fd3f3f4: Waiting Step #4: f669b1f58b23: Waiting Step #4: a88252db19c9: Waiting Step #4: b393aff931c0: Waiting Step #4: 476887b9e4f2: Waiting Step #4: eb373203f29c: Waiting Step #4: c878006fe4fe: Waiting Step #4: bcd3173489a9: Waiting Step #4: 5644dbe182f5: Waiting Step #4: 818d357f89dc: Waiting Step #4: e93eefb4ca22: Waiting Step #4: 3bf35587d70e: Waiting Step #4: 611c16edb664: Waiting Step #4: ff9b3fdd3770: Waiting Step #4: dc1ef8a0708c: Waiting Step #4: c9452c900323: Waiting Step #4: 05c4230a3e2d: Verifying Checksum Step #4: 05c4230a3e2d: Download complete Step #4: ef2dfda34072: Verifying Checksum Step #4: ef2dfda34072: Download complete Step #4: 4a716d0a8853: Verifying Checksum Step #4: 4a716d0a8853: Download complete Step #4: ef2dfda34072: Pull complete Step #4: c9452c900323: Verifying Checksum Step #4: c9452c900323: Download complete Step #4: bcb66fd3f3f4: Verifying Checksum Step #4: bcb66fd3f3f4: Download complete Step #4: fbb1f50ce49e: Verifying Checksum Step #4: fbb1f50ce49e: Download complete Step #4: 4a716d0a8853: Pull complete Step #4: a88252db19c9: Verifying Checksum Step #4: a88252db19c9: Download complete Step #4: 05c4230a3e2d: Pull complete Step #4: 0e0ab7ce5454: Verifying Checksum Step #4: 0e0ab7ce5454: Download complete Step #4: 53b45cbd7d3c: Verifying Checksum Step #4: 53b45cbd7d3c: Download complete Step #4: f669b1f58b23: Download complete Step #4: b393aff931c0: Verifying Checksum Step #4: b393aff931c0: Download complete Step #4: c9452c900323: Pull complete Step #4: eb373203f29c: Verifying Checksum Step #4: eb373203f29c: Download complete Step #4: fbb1f50ce49e: Pull complete Step #4: 818d357f89dc: Verifying Checksum Step #4: 818d357f89dc: Download complete Step #4: 7afce11c0328: Verifying Checksum Step #4: 7afce11c0328: Download complete Step #4: ff9b3fdd3770: Verifying Checksum Step #4: ff9b3fdd3770: Download complete Step #4: bcd3173489a9: Verifying Checksum Step #4: bcd3173489a9: Download complete Step #4: dc1ef8a0708c: Download complete Step #4: 476887b9e4f2: Download complete Step #4: c878006fe4fe: Verifying Checksum Step #4: c878006fe4fe: Download complete Step #4: 3bf35587d70e: Verifying Checksum Step #4: 3bf35587d70e: Download complete Step #4: e93eefb4ca22: Verifying Checksum Step #4: e93eefb4ca22: Download complete Step #4: 611c16edb664: Download complete Step #4: 5644dbe182f5: Verifying Checksum Step #4: 5644dbe182f5: Download complete Step #4: 53b45cbd7d3c: Pull complete Step #4: bcb66fd3f3f4: Pull complete Step #4: a88252db19c9: Pull complete Step #4: 0e0ab7ce5454: Pull complete Step #4: 7afce11c0328: Pull complete Step #4: f669b1f58b23: Pull complete Step #4: b393aff931c0: Pull complete Step #4: eb373203f29c: Pull complete Step #4: bcd3173489a9: Pull complete Step #4: 818d357f89dc: Pull complete Step #4: 3bf35587d70e: Pull complete Step #4: ff9b3fdd3770: Pull complete Step #4: dc1ef8a0708c: Pull complete Step #4: 476887b9e4f2: Pull complete Step #4: c878006fe4fe: Pull complete Step #4: 5644dbe182f5: Pull complete Step #4: e93eefb4ca22: Pull complete Step #4: 611c16edb664: Pull complete Step #4: Digest: sha256:065adb7119f5513ea3b47fe152282cf37f3b847444ab28cc231ac6d5877d1098 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/FuzzDecoder.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzDecoder.zip or Step #5: /corpus/FuzzDecoder.zip.zip, and cannot find /corpus/FuzzDecoder.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzDecoder. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzNewEndpoint.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzNewEndpoint.zip or Step #5: /corpus/FuzzNewEndpoint.zip.zip, and cannot find /corpus/FuzzNewEndpoint.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzNewEndpoint. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzParseSignedBytes.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzParseSignedBytes.zip or Step #5: /corpus/FuzzParseSignedBytes.zip.zip, and cannot find /corpus/FuzzParseSignedBytes.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzParseSignedBytes. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzParser.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzParser.zip or Step #5: /corpus/FuzzParser.zip.zip, and cannot find /corpus/FuzzParser.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzParser. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzPatchDelta.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzPatchDelta.zip or Step #5: /corpus/FuzzPatchDelta.zip.zip, and cannot find /corpus/FuzzPatchDelta.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzPatchDelta. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image go-git Step #5: python infra/helper.py build_fuzzers --sanitizer coverage go-git Step #5: python infra/helper.py coverage go-git Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1