starting build "56373ba5-4c28-4318-9d5a-6f950df3fc9d" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b" Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Sending build context to Docker daemon 5.12kB Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": b549f31133a9: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 331d25ff9ac6: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 7f4811f93e43: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1449f4b02c73: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": d5f9015cdf50: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": bf9191db3d46: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f27160af0e8a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ffc229321738: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 5eb6a76cbe80: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": e4f88222f8b5: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 6e3b3ba61038: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 91cc90b1221a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 022be336536a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8d7517370834: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 143d14c055b2: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 563697c080f5: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": a5f2882d703b: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8da8b2999c07: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 38cc6e8918e3: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": e4f88222f8b5: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f27160af0e8a: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4a950f999ebb: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 152c59a4a631: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 221f4d7c2908: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ffc229321738: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 38cc6e8918e3: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 5eb6a76cbe80: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": a5f2882d703b: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2254c1dc0a72: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4a950f999ebb: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 221f4d7c2908: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 022be336536a: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 11436d2b55b1: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1ce3f1d18760: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e86f2e12e91: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f247db4944c2: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 762bd85308ec: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ec844ac4e3d0: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2dc59509164e: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 0cde037983b3: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e86f2e12e91: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 3ddf7ad7b27e: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": faa202d7867d: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1cf9d8798e7a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f247db4944c2: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1ce3f1d18760: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 32059e3a3678: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 11436d2b55b1: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ec844ac4e3d0: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 762bd85308ec: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2dc59509164e: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 3ddf7ad7b27e: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": faa202d7867d: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1cf9d8798e7a: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 32059e3a3678: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 40d504b9d98a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 16ab56a2166a: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e63b3bc3844: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 27228757afc0: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 75967b614453: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 00f45086d84f: Pulling fs layer Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 40d504b9d98a: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 16ab56a2166a: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 75967b614453: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e63b3bc3844: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 00f45086d84f: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 27228757afc0: Waiting Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": d5f9015cdf50: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": d5f9015cdf50: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 7f4811f93e43: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 7f4811f93e43: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ffc229321738: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ffc229321738: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f27160af0e8a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": b549f31133a9: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": b549f31133a9: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1449f4b02c73: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1449f4b02c73: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 91cc90b1221a: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 91cc90b1221a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 6e3b3ba61038: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 6e3b3ba61038: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8d7517370834: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8d7517370834: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 022be336536a: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 022be336536a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 563697c080f5: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 143d14c055b2: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 143d14c055b2: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 331d25ff9ac6: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 331d25ff9ac6: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": e4f88222f8b5: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": e4f88222f8b5: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8da8b2999c07: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8da8b2999c07: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 38cc6e8918e3: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 38cc6e8918e3: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": a5f2882d703b: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": a5f2882d703b: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4a950f999ebb: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4a950f999ebb: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 221f4d7c2908: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 152c59a4a631: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 152c59a4a631: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 11436d2b55b1: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 11436d2b55b1: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2254c1dc0a72: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2254c1dc0a72: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1ce3f1d18760: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": b549f31133a9: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e86f2e12e91: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f247db4944c2: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 762bd85308ec: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 762bd85308ec: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ec844ac4e3d0: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ec844ac4e3d0: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 0cde037983b3: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": faa202d7867d: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": faa202d7867d: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 3ddf7ad7b27e: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 3ddf7ad7b27e: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1cf9d8798e7a: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1cf9d8798e7a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 5eb6a76cbe80: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 5eb6a76cbe80: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 40d504b9d98a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 32059e3a3678: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2dc59509164e: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2dc59509164e: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 27228757afc0: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 27228757afc0: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 00f45086d84f: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 00f45086d84f: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 16ab56a2166a: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 16ab56a2166a: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e63b3bc3844: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e63b3bc3844: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": bf9191db3d46: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": bf9191db3d46: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 331d25ff9ac6: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 75967b614453: Verifying Checksum Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 75967b614453: Download complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 7f4811f93e43: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1449f4b02c73: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": d5f9015cdf50: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": bf9191db3d46: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f27160af0e8a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ffc229321738: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 5eb6a76cbe80: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": e4f88222f8b5: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 6e3b3ba61038: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 91cc90b1221a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 022be336536a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8d7517370834: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 143d14c055b2: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 563697c080f5: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": a5f2882d703b: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 8da8b2999c07: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 38cc6e8918e3: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4a950f999ebb: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 152c59a4a631: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 221f4d7c2908: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2254c1dc0a72: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 11436d2b55b1: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1ce3f1d18760: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e86f2e12e91: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": f247db4944c2: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 762bd85308ec: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ec844ac4e3d0: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 2dc59509164e: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 0cde037983b3: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 3ddf7ad7b27e: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": faa202d7867d: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 1cf9d8798e7a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 32059e3a3678: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 40d504b9d98a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 16ab56a2166a: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 4e63b3bc3844: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 27228757afc0: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 75967b614453: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": 00f45086d84f: Pull complete Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Digest: sha256:f09b97d8e44ca58f1f4aa8cda3a13c81cb2c26f6a3e702b48697992abc4b26ea Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> b90825186b34 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 2/6 : RUN git clone --depth 1 https://github.com/oxia-db/oxia Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> Running in f483a89f0a0e Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Cloning into 'oxia'... Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Removing intermediate container f483a89f0a0e Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> af64ffe18388 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 3/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/cncf-fuzzing Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> Running in 3b8d2777a60f Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Cloning into 'cncf-fuzzing'... Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Removing intermediate container 3b8d2777a60f Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> 850bb73a75ec Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> Running in d51552eb20ae Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Cloning into 'go-118-fuzz-build'... Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Removing intermediate container d51552eb20ae Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> 417878647d8d Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> 8c22671b2da9 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Step 6/6 : WORKDIR $SRC/oxia Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> Running in ab04d8fc33ed Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Removing intermediate container ab04d8fc33ed Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": ---> 3ce7a37e7350 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Successfully built 3ce7a37e7350 Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Successfully tagged gcr.io/oss-fuzz/oxia:latest Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/oxia:latest Finished Step #1 - "build-d44c2773-3dd5-4bca-975d-66c4a6844a8b" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/oxia Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filez2oAaO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/filez2oAaO '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file6BJ9Cd Step #2 - "srcmap": + cat /tmp/filez2oAaO Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/file6BJ9Cd /tmp/filez2oAaO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3 Step #2 - "srcmap": + jq_inplace /tmp/filez2oAaO '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/AdamKorcz/cncf-fuzzing", rev: "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file4eonfK Step #2 - "srcmap": + cat /tmp/filez2oAaO Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/AdamKorcz/cncf-fuzzing", rev: "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" }' Step #2 - "srcmap": + mv /tmp/file4eonfK /tmp/filez2oAaO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/oxia/.git Step #2 - "srcmap": + GIT_DIR=/src/oxia Step #2 - "srcmap": + cd /src/oxia Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/oxia-db/oxia Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=81e9b5851fa6a9571524669fba31c5d7c65b2e92 Step #2 - "srcmap": + jq_inplace /tmp/filez2oAaO '."/src/oxia" = { type: "git", url: "https://github.com/oxia-db/oxia", rev: "81e9b5851fa6a9571524669fba31c5d7c65b2e92" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileAcqjPg Step #2 - "srcmap": + cat /tmp/filez2oAaO Step #2 - "srcmap": + jq '."/src/oxia" = { type: "git", url: "https://github.com/oxia-db/oxia", rev: "81e9b5851fa6a9571524669fba31c5d7c65b2e92" }' Step #2 - "srcmap": + mv /tmp/fileAcqjPg /tmp/filez2oAaO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filez2oAaO Step #2 - "srcmap": + rm /tmp/filez2oAaO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/cncf-fuzzing", Step #2 - "srcmap": "rev": "2aedaf8ecd1827265e1521ed5a7b3fc7ab5a31a3" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/oxia": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/oxia-db/oxia", Step #2 - "srcmap": "rev": "81e9b5851fa6a9571524669fba31c5d7c65b2e92" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/oxia/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-01-14 06:07:11-- https://go.dev/dl/go1.25.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving go.dev (go.dev)... 216.239.38.21, 216.239.32.21, 216.239.36.21, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to go.dev (go.dev)|216.239.38.21|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 302 Found Step #3 - "compile-libfuzzer-coverage-x86_64": Location: https://dl.google.com/go/go1.25.3.linux-amd64.tar.gz [following] Step #3 - "compile-libfuzzer-coverage-x86_64": --2026-01-14 06:07:11-- https://dl.google.com/go/go1.25.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving dl.google.com (dl.google.com)... 74.125.126.190, 74.125.126.93, 74.125.126.91, ... Step #3 - "compile-libfuzzer-coverage-x86_64": Connecting to dl.google.com (dl.google.com)|74.125.126.190|:443... connected. Step #3 - "compile-libfuzzer-coverage-x86_64": HTTP request sent, awaiting response... 200 OK Step #3 - "compile-libfuzzer-coverage-x86_64": Length: 59767979 (57M) [application/x-gzip] Step #3 - "compile-libfuzzer-coverage-x86_64": Saving to: 'go1.25.3.linux-amd64.tar.gz' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": go1.25.3. 0%[ ] 0 --.-KB/s go1.25.3.l 0%[ ] 49.16K 240KB/s go1.25.3.li 0%[ ] 209.16K 493KB/s go1.25.3.lin 0%[ ] 529.16K 844KB/s go1.25.3.linu 2%[ ] 1.21M 1.46MB/s go1.25.3.linux 5%[> ] 2.90M 2.82MB/s go1.25.3.linux- 12%[=> ] 7.04M 5.73MB/s go1.25.3.linux-a 20%[===> ] 11.73M 8.14MB/s go1.25.3.linux-am 29%[====> ] 16.98M 10.4MB/s go1.25.3.linux-amd 37%[======> ] 21.22M 11.5MB/s go1.25.3.linux-amd6 45%[========> ] 26.21M 12.8MB/s o1.25.3.linux-amd64 54%[=========> ] 31.05M 13.9MB/s 1.25.3.linux-amd64. 61%[===========> ] 35.29M 14.4MB/s .25.3.linux-amd64.t 69%[============> ] 39.74M 15.0MB/s 25.3.linux-amd64.ta 76%[==============> ] 43.83M 15.4MB/s 5.3.linux-amd64.tar 85%[================> ] 48.63M 15.9MB/s eta 1s .3.linux-amd64.tar. 95%[==================> ] 54.38M 17.7MB/s eta 1s go1.25.3.linux-amd6 100%[===================>] 57.00M 17.9MB/s in 3.4s Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": 2026-01-14 06:07:15 (16.9 MB/s) - 'go1.25.3.linux-amd64.tar.gz' saved [59767979/59767979] Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": building fuzzers Step #3 - "compile-libfuzzer-coverage-x86_64": Setting up seed corpus Step #3 - "compile-libfuzzer-coverage-x86_64": Copied seed corpus from cncf-fuzzing to oxia/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/pebble/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.72.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20250506013437-ce4c2cf36ca6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emirpasic/gods/v2 v2.0.0-alpha Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/edsrzf/mmap-go v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/raft v1.7.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/juju/fslock v0.0.0-20160525022230-4d5c94c67b4b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magodo/slog2hclog v0.0.0-20240614031327-090ebd72a033 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.47.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-metrics v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-msgpack/v2 v2.1.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-metrics v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-immutable-radix v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.63.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.16.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/redact v1.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/errors v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/crlib v0.0.0-20241112164430-1264a2edc35b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/tokenbucket v0.0.0-20250429170803-42689b6311bb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/swiss v0.0.0-20250624142022-d6e517c1d961 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RaduBerinde/axisds v0.0.0-20250419182453-5135a0650657 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/minlz v1.0.1-0.20250507153514-87eb42fe8882 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DataDog/zstd v1.5.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/RaduBerinde/btreemap v0.0.0-20250419174037-3d62b7205d54 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/getsentry/sentry-go v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cockroachdb/logtags v0.0.0-20241215232642-bb51bb14a506 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVPutGet" -> [string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVRangeScan" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVDeleteRange" -> [string string string string string string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVComparisonTypes" -> [string uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKVKeyOrdering" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzMetadataLoadStore" -> [int64 uint16 bool string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzMetadataLeaderHelper" -> [bool string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzE2EOperations" -> [string string string string string string string string string string string string string string string string string string string string uint8 uint8 uint8 uint8 uint8] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzShardStatusUnmarshalInvalid" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzServerGetIdentifier" -> [bool string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWalAppendRead" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWalMultipleEntries" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzHierarchicalEncodeDecode" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzNaturalEncodeDecode" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzEncodingPreservesOrder" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzHierarchicalSortingProperties" -> [string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCompareWithSlashProperties" -> [string string string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzSortingStability" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDatabaseRangeOperations" -> [[]byte []byte int32] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDatabaseKeyValidation" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": Copying fuzzer options files Step #3 - "compile-libfuzzer-coverage-x86_64": Converting seed corpus to libFuzzer format Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVPutGet Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVRangeScan Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVDeleteRange Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVComparisonTypes Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzKVKeyOrdering Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzMetadataLoadStore Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzMetadataLeaderHelper Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzE2EOperations Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzShardStatusUnmarshalInvalid Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzServerGetIdentifier Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzWalAppendRead Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzWalMultipleEntries Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzHierarchicalEncodeDecode Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzNaturalEncodeDecode Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzEncodingPreservesOrder Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzHierarchicalSortingProperties Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzCompareWithSlashProperties Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzSortingStability Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzDatabaseRangeOperations Step #3 - "compile-libfuzzer-coverage-x86_64": Processing corpus for FuzzDatabaseKeyValidation Step #3 - "compile-libfuzzer-coverage-x86_64": Seed corpus setup complete Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 331d25ff9ac6: Already exists Step #4: 7f4811f93e43: Already exists Step #4: af41fefaae93: Pulling fs layer Step #4: 4a518ae63354: Pulling fs layer Step #4: fdf6a1f3d4e9: Pulling fs layer Step #4: 421d3824bf7c: Pulling fs layer Step #4: c4d1682a255f: Pulling fs layer Step #4: de2add8be930: Pulling fs layer Step #4: 18248c285058: Pulling fs layer Step #4: 64aa356fd701: Pulling fs layer Step #4: dfe92e50c230: Pulling fs layer Step #4: 01476a19d153: Pulling fs layer Step #4: 666b86a0ef21: Pulling fs layer Step #4: 53ca1cb4e23f: Pulling fs layer Step #4: 837b61cc240b: Pulling fs layer Step #4: 0e9c18a11c6f: Pulling fs layer Step #4: 776213c12561: Pulling fs layer Step #4: 5bec4c9eb524: Pulling fs layer Step #4: ef297f2bb0bf: Pulling fs layer Step #4: 6c231c715396: Pulling fs layer Step #4: 0384d9df3071: Pulling fs layer Step #4: ed88f7341982: Pulling fs layer Step #4: c43797feedc2: Pulling fs layer Step #4: 8dd4699374e0: Pulling fs layer Step #4: 2710c0ab2722: Pulling fs layer Step #4: 9a55b5a70812: Pulling fs layer Step #4: 01476a19d153: Waiting Step #4: 666b86a0ef21: Waiting Step #4: 0e9c18a11c6f: Waiting Step #4: 53ca1cb4e23f: Waiting Step #4: 776213c12561: Waiting Step #4: 5bec4c9eb524: Waiting Step #4: ef297f2bb0bf: Waiting Step #4: 6c231c715396: Waiting Step #4: 18248c285058: Waiting Step #4: 837b61cc240b: Waiting Step #4: 0384d9df3071: Waiting Step #4: ed88f7341982: Waiting Step #4: 2710c0ab2722: Waiting Step #4: c43797feedc2: Waiting Step #4: 8dd4699374e0: Waiting Step #4: 9a55b5a70812: Waiting Step #4: dfe92e50c230: Waiting Step #4: fdf6a1f3d4e9: Verifying Checksum Step #4: fdf6a1f3d4e9: Download complete Step #4: c4d1682a255f: Verifying Checksum Step #4: c4d1682a255f: Download complete Step #4: af41fefaae93: Download complete Step #4: 421d3824bf7c: Verifying Checksum Step #4: 421d3824bf7c: Download complete Step #4: 4a518ae63354: Verifying Checksum Step #4: 4a518ae63354: Download complete Step #4: 18248c285058: Verifying Checksum Step #4: 18248c285058: Download complete Step #4: 64aa356fd701: Verifying Checksum Step #4: 64aa356fd701: Download complete Step #4: dfe92e50c230: Verifying Checksum Step #4: dfe92e50c230: Download complete Step #4: af41fefaae93: Pull complete Step #4: 53ca1cb4e23f: Verifying Checksum Step #4: 53ca1cb4e23f: Download complete Step #4: 837b61cc240b: Download complete Step #4: 666b86a0ef21: Verifying Checksum Step #4: 666b86a0ef21: Download complete Step #4: 776213c12561: Download complete Step #4: ef297f2bb0bf: Verifying Checksum Step #4: ef297f2bb0bf: Download complete Step #4: de2add8be930: Verifying Checksum Step #4: de2add8be930: Download complete Step #4: 4a518ae63354: Pull complete Step #4: 6c231c715396: Verifying Checksum Step #4: 6c231c715396: Download complete Step #4: fdf6a1f3d4e9: Pull complete Step #4: c43797feedc2: Verifying Checksum Step #4: c43797feedc2: Download complete Step #4: ed88f7341982: Verifying Checksum Step #4: ed88f7341982: Download complete Step #4: 01476a19d153: Download complete Step #4: 2710c0ab2722: Verifying Checksum Step #4: 2710c0ab2722: Download complete Step #4: 421d3824bf7c: Pull complete Step #4: 9a55b5a70812: Verifying Checksum Step #4: 9a55b5a70812: Download complete Step #4: 8dd4699374e0: Verifying Checksum Step #4: 8dd4699374e0: Download complete Step #4: c4d1682a255f: Pull complete Step #4: 0e9c18a11c6f: Download complete Step #4: 0384d9df3071: Verifying Checksum Step #4: 0384d9df3071: Download complete Step #4: 5bec4c9eb524: Verifying Checksum Step #4: 5bec4c9eb524: Download complete Step #4: de2add8be930: Pull complete Step #4: 18248c285058: Pull complete Step #4: 64aa356fd701: Pull complete Step #4: dfe92e50c230: Pull complete Step #4: 01476a19d153: Pull complete Step #4: 666b86a0ef21: Pull complete Step #4: 53ca1cb4e23f: Pull complete Step #4: 837b61cc240b: Pull complete Step #4: 0e9c18a11c6f: Pull complete Step #4: 776213c12561: Pull complete Step #4: 5bec4c9eb524: Pull complete Step #4: ef297f2bb0bf: Pull complete Step #4: 6c231c715396: Pull complete Step #4: 0384d9df3071: Pull complete Step #4: ed88f7341982: Pull complete Step #4: c43797feedc2: Pull complete Step #4: 8dd4699374e0: Pull complete Step #4: 2710c0ab2722: Pull complete Step #4: 9a55b5a70812: Pull complete Step #4: Digest: sha256:8236763117bccc523e675c6ecb6a1215c4fd60620d8553d02b5fac53efb8921e Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzSortingStability Step #5: Running go target FuzzCompareWithSlashProperties Step #5: Running go target FuzzEncodingPreservesOrder Step #5: Running go target FuzzKVKeyOrdering Step #5: Running go target FuzzMetadataLeaderHelper Step #5: Running go target FuzzHierarchicalSortingProperties Step #5: Generated 469 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzSortingStability Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzKVDeleteRange Step #5: Running go target FuzzKVComparisonTypes Step #5: Running go target FuzzServerGetIdentifier Step #5: Generated 328 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVKeyOrdering Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzE2EOperations Step #5: Running go target FuzzKVRangeScan Step #5: Generated 96 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzMetadataLeaderHelper Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 163 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCompareWithSlashProperties Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 98 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzServerGetIdentifier Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 661 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzEncodingPreservesOrder Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 378 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVComparisonTypes Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 541 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzHierarchicalSortingProperties Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzShardStatusUnmarshalInvalid Step #5: Running go target FuzzKVPutGet Step #5: Running go target FuzzWalMultipleEntries Step #5: Running go target FuzzHierarchicalEncodeDecode Step #5: Running go target FuzzDatabaseKeyValidation Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 619 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVRangeScan Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 268 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzHierarchicalEncodeDecode Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 231 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDatabaseKeyValidation Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2412 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzShardStatusUnmarshalInvalid Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzDatabaseRangeOperations Step #5: Running go target FuzzMetadataLoadStore Step #5: Running go target FuzzWalAppendRead Step #5: Generated 251 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWalAppendRead Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 112 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzMetadataLoadStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 553 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWalMultipleEntries Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 462 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDatabaseRangeOperations Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzNaturalEncodeDecode Step #5: Generated 210 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzNaturalEncodeDecode Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2385 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVDeleteRange Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2393 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzE2EOperations Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1365 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKVPutGet Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2026/01/14 06:13:58 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2026/01/14 06:13:58 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 63e5bc7682b8: Already exists Step #6: 655e5854bd03: Already exists Step #6: 4f4e73db334e: Already exists Step #6: 271086bcee88: Already exists Step #6: c3d1a5d799dc: Already exists Step #6: 07cc84115d75: Already exists Step #6: ab29b921ec14: Pulling fs layer Step #6: 4cbb58df7f25: Pulling fs layer Step #6: 4cbb58df7f25: Download complete Step #6: ab29b921ec14: Verifying Checksum Step #6: ab29b921ec14: Download complete Step #6: ab29b921ec14: Pull complete Step #6: 4cbb58df7f25: Pull complete Step #6: Digest: sha256:5e3ddd1fe51f8d741e592f72e7bd1e35cc39d0852ad1bd41b30fa568aa1789d4 Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 9.2 KiB] 0% Done / [1/3 files][ 9.2 KiB/ 9.2 KiB] 99% Done / [2/3 files][ 9.2 KiB/ 9.2 KiB] 99% Done / [3/3 files][ 9.2 KiB/ 9.2 KiB] 100% Done Step #7: Operation completed over 3 objects/9.2 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDatabaseKeyValidation.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzEncodingPreservesOrder.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVPutGet.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWalMultipleEntries.json [Content-Type=application/json]... Step #9: / [0/21 files][ 0.0 B/ 16.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHierarchicalSortingProperties.json [Content-Type=application/json]... Step #9: / [0/21 files][ 815.0 B/ 16.4 KiB] 4% Done / [1/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [2/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzShardStatusUnmarshalInvalid.json [Content-Type=application/json]... Step #9: / [2/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [3/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDatabaseRangeOperations.json [Content-Type=application/json]... Step #9: / [3/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVDeleteRange.json [Content-Type=application/json]... Step #9: / [3/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [4/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzNaturalEncodeDecode.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.0 KiB/ 16.4 KiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzMetadataLoadStore.json [Content-Type=application/json]... Step #9: / [5/21 files][ 4.8 KiB/ 16.4 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVComparisonTypes.json [Content-Type=application/json]... Step #9: / [5/21 files][ 6.4 KiB/ 16.4 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCompareWithSlashProperties.json [Content-Type=application/json]... Step #9: / [5/21 files][ 6.4 KiB/ 16.4 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzMetadataLeaderHelper.json [Content-Type=application/json]... Step #9: / [5/21 files][ 6.4 KiB/ 16.4 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVKeyOrdering.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.0 KiB/ 16.4 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzSortingStability.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.0 KiB/ 16.4 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzServerGetIdentifier.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzHierarchicalEncodeDecode.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzE2EOperations.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWalAppendRead.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKVRangeScan.json [Content-Type=application/json]... Step #9: / [5/21 files][ 8.8 KiB/ 16.4 KiB] 53% Done / [6/21 files][ 9.6 KiB/ 16.4 KiB] 58% Done / [7/21 files][ 10.4 KiB/ 16.4 KiB] 63% Done / [8/21 files][ 11.9 KiB/ 16.4 KiB] 72% Done / [9/21 files][ 11.9 KiB/ 16.4 KiB] 72% Done / [10/21 files][ 11.9 KiB/ 16.4 KiB] 72% Done / [11/21 files][ 11.9 KiB/ 16.4 KiB] 72% Done / [12/21 files][ 14.8 KiB/ 16.4 KiB] 90% Done / [13/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [14/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [15/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [16/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [17/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [18/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [19/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done / [20/21 files][ 16.4 KiB/ 16.4 KiB] 99% Done - - [21/21 files][ 16.4 KiB/ 16.4 KiB] 100% Done Step #9: Operation completed over 21 objects/16.4 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVDeleteRange.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][ 0.0 B/439.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHierarchicalSortingProperties.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][ 0.0 B/439.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzMetadataLeaderHelper.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][ 0.0 B/439.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVRangeScan.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][141.9 KiB/439.6 KiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzEncodingPreservesOrder.log [Content-Type=application/octet-stream]... Step #11: / [0/20 files][142.0 KiB/439.6 KiB] 32% Done / [1/20 files][173.5 KiB/439.6 KiB] 39% Done / [2/20 files][173.5 KiB/439.6 KiB] 39% Done / [3/20 files][173.5 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWalAppendRead.log [Content-Type=application/octet-stream]... Step #11: / [3/20 files][173.5 KiB/439.6 KiB] 39% Done / [4/20 files][173.5 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzShardStatusUnmarshalInvalid.log [Content-Type=application/octet-stream]... Step #11: / [4/20 files][173.5 KiB/439.6 KiB] 39% Done / [5/20 files][173.5 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzE2EOperations.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][173.5 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDatabaseKeyValidation.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][173.5 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzServerGetIdentifier.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][173.7 KiB/439.6 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCompareWithSlashProperties.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWalMultipleEntries.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVComparisonTypes.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVKeyOrdering.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKVPutGet.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzHierarchicalEncodeDecode.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzNaturalEncodeDecode.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzSortingStability.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDatabaseRangeOperations.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzMetadataLoadStore.log [Content-Type=application/octet-stream]... Step #11: / [5/20 files][317.8 KiB/439.6 KiB] 72% Done / [6/20 files][317.8 KiB/439.6 KiB] 72% Done / [7/20 files][317.8 KiB/439.6 KiB] 72% Done / [8/20 files][338.9 KiB/439.6 KiB] 77% Done / [9/20 files][339.0 KiB/439.6 KiB] 77% Done / [10/20 files][339.0 KiB/439.6 KiB] 77% Done / [11/20 files][357.2 KiB/439.6 KiB] 81% Done / [12/20 files][439.5 KiB/439.6 KiB] 99% Done / [13/20 files][439.6 KiB/439.6 KiB] 99% Done / [14/20 files][439.6 KiB/439.6 KiB] 99% Done / [15/20 files][439.6 KiB/439.6 KiB] 99% Done - - [16/20 files][439.6 KiB/439.6 KiB] 99% Done - [17/20 files][439.6 KiB/439.6 KiB] 99% Done - [18/20 files][439.6 KiB/439.6 KiB] 99% Done - [19/20 files][439.6 KiB/439.6 KiB] 99% Done - [20/20 files][439.6 KiB/439.6 KiB] 100% Done Step #11: Operation completed over 20 objects/439.6 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 472.0 B] / [1 files][ 472.0 B/ 472.0 B] Step #12: Operation completed over 1 objects/472.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 300 0 0 100 300 0 1477 --:--:-- --:--:-- --:--:-- 1485 Finished Step #13 PUSH DONE