starting build "4b245e33-5ba4-4c2d-bede-6a38431e85d5" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 3d710c687d00: Pulling fs layer Step #1: 5871c999bb7f: Pulling fs layer Step #1: 49000c630162: Pulling fs layer Step #1: 5392ce741eff: Pulling fs layer Step #1: 263734d12e9c: Pulling fs layer Step #1: 7306bd1f392c: Pulling fs layer Step #1: 4e4e8971c238: Pulling fs layer Step #1: ab58def3c482: Pulling fs layer Step #1: bf2fdf6c64d4: Pulling fs layer Step #1: 19538d0a2442: Pulling fs layer Step #1: 7810f4e9fe4d: Pulling fs layer Step #1: 9d66997e22ca: Pulling fs layer Step #1: 2ffeb66e248c: Pulling fs layer Step #1: e931b1039fcc: Pulling fs layer Step #1: 68e5052c5cfe: Pulling fs layer Step #1: 872fbc0da05e: Pulling fs layer Step #1: 4e4e8971c238: Waiting Step #1: 0c63282fb394: Pulling fs layer Step #1: ab58def3c482: Waiting Step #1: 9e5473413b08: Pulling fs layer Step #1: 5392ce741eff: Waiting Step #1: e57b519feb8f: Pulling fs layer Step #1: bf2fdf6c64d4: Waiting Step #1: 263734d12e9c: Waiting Step #1: 7bb19315c9db: Pulling fs layer Step #1: 7ebdcf9f783d: Pulling fs layer Step #1: 7306bd1f392c: Waiting Step #1: 19538d0a2442: Waiting Step #1: 49000c630162: Waiting Step #1: ababc272d73e: Pulling fs layer Step #1: 2ffeb66e248c: Waiting Step #1: e931b1039fcc: Waiting Step #1: 7810f4e9fe4d: Waiting Step #1: 9b86524e6f04: Pulling fs layer Step #1: b686b4d27010: Pulling fs layer Step #1: 68e5052c5cfe: Waiting Step #1: 41bd949d07dc: Pulling fs layer Step #1: 0c63282fb394: Waiting Step #1: 752af61ae2bf: Pulling fs layer Step #1: 9e5473413b08: Waiting Step #1: 9b3040955b60: Pulling fs layer Step #1: e57b519feb8f: Waiting Step #1: ababc272d73e: Waiting Step #1: acb248606d61: Pulling fs layer Step #1: 7bb19315c9db: Waiting Step #1: 4daa157fbf24: Pulling fs layer Step #1: 7ebdcf9f783d: Waiting Step #1: b686b4d27010: Waiting Step #1: a691504df577: Pulling fs layer Step #1: 9b86524e6f04: Waiting Step #1: 41bd949d07dc: Waiting Step #1: c4c6ca34d89b: Pulling fs layer Step #1: 752af61ae2bf: Waiting Step #1: b94def7d434a: Pulling fs layer Step #1: acb248606d61: Waiting Step #1: 9b3040955b60: Waiting Step #1: 0e0d29e7e591: Pulling fs layer Step #1: 401e66b3862a: Pulling fs layer Step #1: 4daa157fbf24: Waiting Step #1: a691504df577: Waiting Step #1: c4c6ca34d89b: Waiting Step #1: b94def7d434a: Waiting Step #1: 0e0d29e7e591: Waiting Step #1: 5871c999bb7f: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 5392ce741eff: Verifying Checksum Step #1: 5392ce741eff: Download complete Step #1: 49000c630162: Verifying Checksum Step #1: 49000c630162: Download complete Step #1: 263734d12e9c: Verifying Checksum Step #1: 263734d12e9c: Download complete Step #1: 4e4e8971c238: Verifying Checksum Step #1: 4e4e8971c238: Download complete Step #1: 3d710c687d00: Verifying Checksum Step #1: 3d710c687d00: Download complete Step #1: ab58def3c482: Verifying Checksum Step #1: ab58def3c482: Download complete Step #1: b549f31133a9: Pull complete Step #1: 19538d0a2442: Verifying Checksum Step #1: 19538d0a2442: Download complete Step #1: 7810f4e9fe4d: Verifying Checksum Step #1: 7810f4e9fe4d: Download complete Step #1: 9d66997e22ca: Verifying Checksum Step #1: 9d66997e22ca: Download complete Step #1: 2ffeb66e248c: Verifying Checksum Step #1: 2ffeb66e248c: Download complete Step #1: e931b1039fcc: Verifying Checksum Step #1: e931b1039fcc: Download complete Step #1: bf2fdf6c64d4: Verifying Checksum Step #1: bf2fdf6c64d4: Download complete Step #1: 68e5052c5cfe: Verifying Checksum Step #1: 68e5052c5cfe: Download complete Step #1: 872fbc0da05e: Download complete Step #1: 0c63282fb394: Download complete Step #1: 9e5473413b08: Verifying Checksum Step #1: 9e5473413b08: Download complete Step #1: e57b519feb8f: Verifying Checksum Step #1: e57b519feb8f: Download complete Step #1: 7bb19315c9db: Download complete Step #1: ababc272d73e: Download complete Step #1: 7ebdcf9f783d: Verifying Checksum Step #1: 7ebdcf9f783d: Download complete Step #1: 7306bd1f392c: Verifying Checksum Step #1: 7306bd1f392c: Download complete Step #1: 9b86524e6f04: Verifying Checksum Step #1: 9b86524e6f04: Download complete Step #1: b686b4d27010: Verifying Checksum Step #1: b686b4d27010: Download complete Step #1: 41bd949d07dc: Verifying Checksum Step #1: 41bd949d07dc: Download complete Step #1: 752af61ae2bf: Verifying Checksum Step #1: 752af61ae2bf: Download complete Step #1: 4daa157fbf24: Download complete Step #1: 9b3040955b60: Verifying Checksum Step #1: 9b3040955b60: Download complete Step #1: a691504df577: Verifying Checksum Step #1: a691504df577: Download complete Step #1: c4c6ca34d89b: Verifying Checksum Step #1: c4c6ca34d89b: Download complete Step #1: acb248606d61: Verifying Checksum Step #1: acb248606d61: Download complete Step #1: b94def7d434a: Verifying Checksum Step #1: b94def7d434a: Download complete Step #1: 3d710c687d00: Pull complete Step #1: 401e66b3862a: Verifying Checksum Step #1: 401e66b3862a: Download complete Step #1: 5871c999bb7f: Pull complete Step #1: 49000c630162: Pull complete Step #1: 5392ce741eff: Pull complete Step #1: 0e0d29e7e591: Verifying Checksum Step #1: 0e0d29e7e591: Download complete Step #1: 263734d12e9c: Pull complete Step #1: 7306bd1f392c: Pull complete Step #1: 4e4e8971c238: Pull complete Step #1: ab58def3c482: Pull complete Step #1: bf2fdf6c64d4: Pull complete Step #1: 19538d0a2442: Pull complete Step #1: 7810f4e9fe4d: Pull complete Step #1: 9d66997e22ca: Pull complete Step #1: 2ffeb66e248c: Pull complete Step #1: e931b1039fcc: Pull complete Step #1: 68e5052c5cfe: Pull complete Step #1: 872fbc0da05e: Pull complete Step #1: 0c63282fb394: Pull complete Step #1: 9e5473413b08: Pull complete Step #1: e57b519feb8f: Pull complete Step #1: 7bb19315c9db: Pull complete Step #1: 7ebdcf9f783d: Pull complete Step #1: ababc272d73e: Pull complete Step #1: 9b86524e6f04: Pull complete Step #1: b686b4d27010: Pull complete Step #1: 41bd949d07dc: Pull complete Step #1: 752af61ae2bf: Pull complete Step #1: 9b3040955b60: Pull complete Step #1: acb248606d61: Pull complete Step #1: 4daa157fbf24: Pull complete Step #1: a691504df577: Pull complete Step #1: c4c6ca34d89b: Pull complete Step #1: b94def7d434a: Pull complete Step #1: 0e0d29e7e591: Pull complete Step #1: 401e66b3862a: Pull complete Step #1: Digest: sha256:3b51b1207e7518ac41c7ff761618cb4ff02d98fb081a86d365d3d2cd2a4dcdad Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> d3da11f92b6d Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/radondb/radon Step #1: ---> Running in 210020a3914f Step #1: Cloning into 'radon'... Step #1: Removing intermediate container 210020a3914f Step #1: ---> c811ec810222 Step #1: Step 3/4 : COPY build.sh $SRC/ Step #1: ---> 576fcff050db Step #1: Step 4/4 : WORKDIR $SRC/radon Step #1: ---> Running in 5d956eb645fa Step #1: Removing intermediate container 5d956eb645fa Step #1: ---> 916673f7a291 Step #1: Successfully built 916673f7a291 Step #1: Successfully tagged gcr.io/oss-fuzz/radon:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/radon Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileiooASN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/radon/.git Step #2 - "srcmap": + GIT_DIR=/src/radon Step #2 - "srcmap": + cd /src/radon Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/radondb/radon Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=517375323dbee0b2a29ad15bc4f2e6e220953977 Step #2 - "srcmap": + jq_inplace /tmp/fileiooASN '."/src/radon" = { type: "git", url: "https://github.com/radondb/radon", rev: "517375323dbee0b2a29ad15bc4f2e6e220953977" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileUJc1ya Step #2 - "srcmap": + cat /tmp/fileiooASN Step #2 - "srcmap": + jq '."/src/radon" = { type: "git", url: "https://github.com/radondb/radon", rev: "517375323dbee0b2a29ad15bc4f2e6e220953977" }' Step #2 - "srcmap": + mv /tmp/fileUJc1ya /tmp/fileiooASN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileiooASN Step #2 - "srcmap": + rm /tmp/fileiooASN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/radon": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/radondb/radon", Step #2 - "srcmap": "rev": "517375323dbee0b2a29ad15bc4f2e6e220953977" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ./src/fuzz/sqlparser Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod init github.com/radondb/radon/src/fuzz/sqlparser Step #3 - "compile-libfuzzer-coverage-x86_64": go: creating new go.mod: module github.com/radondb/radon/src/fuzz/sqlparser Step #3 - "compile-libfuzzer-coverage-x86_64": go: to add module requirements and sums: Step #3 - "compile-libfuzzer-coverage-x86_64": go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer . Fuzz fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/.: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/stretchr/testify/assert Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/dvyukov/go-fuzz-corpus/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/xelabs/go-mysqlstack/sqlparser Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dvyukov/go-fuzz-corpus v0.0.0-20190920191254-c42c1b2914c7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xelabs/go-mysqlstack v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/dvyukov/go-fuzz-corpus/fuzz in github.com/dvyukov/go-fuzz-corpus v0.0.0-20190920191254-c42c1b2914c7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/xelabs/go-mysqlstack/sqlparser in github.com/xelabs/go-mysqlstack v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/stretchr/testify/assert in github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/radondb/radon/src/fuzz/sqlparser Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/radondb/radon/src/fuzz/sqlparser Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 3d710c687d00: Already exists Step #4: 5871c999bb7f: Already exists Step #4: ad204a766461: Pulling fs layer Step #4: aa4d922892b9: Pulling fs layer Step #4: c20c0e93a575: Pulling fs layer Step #4: c3498e8f92bf: Pulling fs layer Step #4: ea12bf4d758c: Pulling fs layer Step #4: 1c528096599d: Pulling fs layer Step #4: 22eae4685097: Pulling fs layer Step #4: 0b0b70aeae3e: Pulling fs layer Step #4: a11f70ce01e7: Pulling fs layer Step #4: 7864dd364e73: Pulling fs layer Step #4: 677db1e5ca03: Pulling fs layer Step #4: a5be37c75947: Pulling fs layer Step #4: c074acbeeb6b: Pulling fs layer Step #4: 815b2ed18259: Pulling fs layer Step #4: 4065e4da32a0: Pulling fs layer Step #4: a5114ccc782f: Pulling fs layer Step #4: 2e062109d3b1: Pulling fs layer Step #4: 1c528096599d: Waiting Step #4: 7864dd364e73: Waiting Step #4: 677db1e5ca03: Waiting Step #4: a11f70ce01e7: Waiting Step #4: 22eae4685097: Waiting Step #4: a5be37c75947: Waiting Step #4: c074acbeeb6b: Waiting Step #4: 0b0b70aeae3e: Waiting Step #4: 815b2ed18259: Waiting Step #4: 4065e4da32a0: Waiting Step #4: c3498e8f92bf: Waiting Step #4: a5114ccc782f: Waiting Step #4: 2e062109d3b1: Waiting Step #4: ea12bf4d758c: Waiting Step #4: c20c0e93a575: Download complete Step #4: ad204a766461: Verifying Checksum Step #4: ad204a766461: Download complete Step #4: aa4d922892b9: Verifying Checksum Step #4: aa4d922892b9: Download complete Step #4: ad204a766461: Pull complete Step #4: ea12bf4d758c: Verifying Checksum Step #4: ea12bf4d758c: Download complete Step #4: 1c528096599d: Verifying Checksum Step #4: 1c528096599d: Download complete Step #4: 22eae4685097: Verifying Checksum Step #4: 22eae4685097: Download complete Step #4: aa4d922892b9: Pull complete Step #4: a11f70ce01e7: Verifying Checksum Step #4: a11f70ce01e7: Download complete Step #4: c20c0e93a575: Pull complete Step #4: 0b0b70aeae3e: Verifying Checksum Step #4: 0b0b70aeae3e: Download complete Step #4: c3498e8f92bf: Verifying Checksum Step #4: c3498e8f92bf: Download complete Step #4: 677db1e5ca03: Verifying Checksum Step #4: 677db1e5ca03: Download complete Step #4: a5be37c75947: Download complete Step #4: c074acbeeb6b: Verifying Checksum Step #4: c074acbeeb6b: Download complete Step #4: 4065e4da32a0: Verifying Checksum Step #4: 4065e4da32a0: Download complete Step #4: 815b2ed18259: Verifying Checksum Step #4: 815b2ed18259: Download complete Step #4: a5114ccc782f: Verifying Checksum Step #4: a5114ccc782f: Download complete Step #4: 2e062109d3b1: Verifying Checksum Step #4: 2e062109d3b1: Download complete Step #4: 7864dd364e73: Verifying Checksum Step #4: 7864dd364e73: Download complete Step #4: c3498e8f92bf: Pull complete Step #4: ea12bf4d758c: Pull complete Step #4: 1c528096599d: Pull complete Step #4: 22eae4685097: Pull complete Step #4: 0b0b70aeae3e: Pull complete Step #4: a11f70ce01e7: Pull complete Step #4: 7864dd364e73: Pull complete Step #4: 677db1e5ca03: Pull complete Step #4: a5be37c75947: Pull complete Step #4: c074acbeeb6b: Pull complete Step #4: 815b2ed18259: Pull complete Step #4: 4065e4da32a0: Pull complete Step #4: a5114ccc782f: Pull complete Step #4: 2e062109d3b1: Pull complete Step #4: Digest: sha256:76043b923f3c4981587d31e2bac9d2d15c5e61786163ddce20c96e78a301caa7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz.zip or Step #5: /corpus/fuzz.zip.zip, and cannot find /corpus/fuzz.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image radon Step #5: python infra/helper.py build_fuzzers --sanitizer coverage radon Step #5: python infra/helper.py coverage radon Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1