starting build "6eb844e1-f477-4705-acfb-e9f3699ba3f7" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 6a031355e5a4: Pulling fs layer Step #1: 0b72f79bb618: Pulling fs layer Step #1: 90335b886515: Pulling fs layer Step #1: 4acfddd8e55d: Pulling fs layer Step #1: e7da934767ce: Pulling fs layer Step #1: ca48cdf3983f: Pulling fs layer Step #1: 7dbcdbf5d55f: Pulling fs layer Step #1: 50e9c68d34ea: Pulling fs layer Step #1: 4e836e3eed39: Pulling fs layer Step #1: 4b5040227f1e: Pulling fs layer Step #1: d3fb02ed4540: Pulling fs layer Step #1: 1f5f6d4a864c: Pulling fs layer Step #1: fac93c045c91: Pulling fs layer Step #1: 8846363f4f98: Pulling fs layer Step #1: 625645c62835: Pulling fs layer Step #1: ef05bcbd095c: Pulling fs layer Step #1: c3f48f44c27e: Pulling fs layer Step #1: 534e4ce04141: Pulling fs layer Step #1: bcc4f22e74eb: Pulling fs layer Step #1: 90335b886515: Waiting Step #1: b92dd1a5cf6c: Pulling fs layer Step #1: b4e67ac51e1a: Pulling fs layer Step #1: 1dd8dea6f287: Pulling fs layer Step #1: 9db7b76f6a4a: Pulling fs layer Step #1: 4e2c795fe7b7: Pulling fs layer Step #1: 4acfddd8e55d: Waiting Step #1: 8a57f4724c32: Pulling fs layer Step #1: 73ce5d51499a: Pulling fs layer Step #1: 8846363f4f98: Waiting Step #1: e7da934767ce: Waiting Step #1: 66494ca4c4bd: Pulling fs layer Step #1: 86951b715a9f: Pulling fs layer Step #1: d3fb02ed4540: Waiting Step #1: 5dda498c2b68: Pulling fs layer Step #1: 4b5040227f1e: Waiting Step #1: 960222163586: Pulling fs layer Step #1: 1f5f6d4a864c: Waiting Step #1: 625645c62835: Waiting Step #1: ca48cdf3983f: Waiting Step #1: fac93c045c91: Waiting Step #1: 4517e38bcfdf: Pulling fs layer Step #1: ef05bcbd095c: Waiting Step #1: f4f6471aefeb: Pulling fs layer Step #1: 7dbcdbf5d55f: Waiting Step #1: bcc4f22e74eb: Waiting Step #1: c3f48f44c27e: Waiting Step #1: 86951b715a9f: Waiting Step #1: b92dd1a5cf6c: Waiting Step #1: 50e9c68d34ea: Waiting Step #1: b4e67ac51e1a: Waiting Step #1: 5dda498c2b68: Waiting Step #1: 8a57f4724c32: Waiting Step #1: 4e836e3eed39: Waiting Step #1: 960222163586: Waiting Step #1: 4e2c795fe7b7: Waiting Step #1: 66494ca4c4bd: Waiting Step #1: 73ce5d51499a: Waiting Step #1: 4517e38bcfdf: Waiting Step #1: 1dd8dea6f287: Waiting Step #1: f4f6471aefeb: Waiting Step #1: 0b72f79bb618: Verifying Checksum Step #1: 0b72f79bb618: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 4acfddd8e55d: Verifying Checksum Step #1: 4acfddd8e55d: Download complete Step #1: e7da934767ce: Verifying Checksum Step #1: e7da934767ce: Download complete Step #1: 90335b886515: Verifying Checksum Step #1: 90335b886515: Download complete Step #1: 7dbcdbf5d55f: Verifying Checksum Step #1: 7dbcdbf5d55f: Download complete Step #1: 6a031355e5a4: Verifying Checksum Step #1: 6a031355e5a4: Download complete Step #1: 50e9c68d34ea: Verifying Checksum Step #1: 50e9c68d34ea: Download complete Step #1: 4b5040227f1e: Verifying Checksum Step #1: 4b5040227f1e: Download complete Step #1: d3fb02ed4540: Verifying Checksum Step #1: d3fb02ed4540: Download complete Step #1: 1f5f6d4a864c: Verifying Checksum Step #1: 1f5f6d4a864c: Download complete Step #1: fac93c045c91: Verifying Checksum Step #1: fac93c045c91: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8846363f4f98: Verifying Checksum Step #1: 8846363f4f98: Download complete Step #1: 625645c62835: Verifying Checksum Step #1: 625645c62835: Download complete Step #1: ef05bcbd095c: Verifying Checksum Step #1: ef05bcbd095c: Download complete Step #1: c3f48f44c27e: Verifying Checksum Step #1: c3f48f44c27e: Download complete Step #1: 534e4ce04141: Verifying Checksum Step #1: 534e4ce04141: Download complete Step #1: bcc4f22e74eb: Download complete Step #1: b92dd1a5cf6c: Download complete Step #1: 4e836e3eed39: Verifying Checksum Step #1: 4e836e3eed39: Download complete Step #1: b4e67ac51e1a: Verifying Checksum Step #1: b4e67ac51e1a: Download complete Step #1: 1dd8dea6f287: Verifying Checksum Step #1: 1dd8dea6f287: Download complete Step #1: 9db7b76f6a4a: Verifying Checksum Step #1: 9db7b76f6a4a: Download complete Step #1: 4e2c795fe7b7: Verifying Checksum Step #1: 4e2c795fe7b7: Download complete Step #1: 8a57f4724c32: Verifying Checksum Step #1: 8a57f4724c32: Download complete Step #1: 66494ca4c4bd: Verifying Checksum Step #1: 66494ca4c4bd: Download complete Step #1: 73ce5d51499a: Verifying Checksum Step #1: 73ce5d51499a: Download complete Step #1: 86951b715a9f: Verifying Checksum Step #1: 86951b715a9f: Download complete Step #1: 5dda498c2b68: Verifying Checksum Step #1: 5dda498c2b68: Download complete Step #1: 960222163586: Download complete Step #1: ca48cdf3983f: Verifying Checksum Step #1: ca48cdf3983f: Download complete Step #1: f4f6471aefeb: Verifying Checksum Step #1: f4f6471aefeb: Download complete Step #1: 6a031355e5a4: Pull complete Step #1: 0b72f79bb618: Pull complete Step #1: 4517e38bcfdf: Verifying Checksum Step #1: 4517e38bcfdf: Download complete Step #1: 90335b886515: Pull complete Step #1: 4acfddd8e55d: Pull complete Step #1: e7da934767ce: Pull complete Step #1: ca48cdf3983f: Pull complete Step #1: 7dbcdbf5d55f: Pull complete Step #1: 50e9c68d34ea: Pull complete Step #1: 4e836e3eed39: Pull complete Step #1: 4b5040227f1e: Pull complete Step #1: d3fb02ed4540: Pull complete Step #1: 1f5f6d4a864c: Pull complete Step #1: fac93c045c91: Pull complete Step #1: 8846363f4f98: Pull complete Step #1: 625645c62835: Pull complete Step #1: ef05bcbd095c: Pull complete Step #1: c3f48f44c27e: Pull complete Step #1: 534e4ce04141: Pull complete Step #1: bcc4f22e74eb: Pull complete Step #1: b92dd1a5cf6c: Pull complete Step #1: b4e67ac51e1a: Pull complete Step #1: 1dd8dea6f287: Pull complete Step #1: 9db7b76f6a4a: Pull complete Step #1: 4e2c795fe7b7: Pull complete Step #1: 8a57f4724c32: Pull complete Step #1: 73ce5d51499a: Pull complete Step #1: 66494ca4c4bd: Pull complete Step #1: 86951b715a9f: Pull complete Step #1: 5dda498c2b68: Pull complete Step #1: 960222163586: Pull complete Step #1: 4517e38bcfdf: Pull complete Step #1: f4f6471aefeb: Pull complete Step #1: Digest: sha256:cf6bea199634095914735427495b253959d9e98c5390a7bed92d9e5d31272c2a Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> f1999e4f2d7b Step #1: Step 2/4 : RUN git clone https://github.com/go-gitea/gitea Step #1: ---> Running in 393d0f9e59f3 Step #1: Cloning into 'gitea'... Step #1: Removing intermediate container 393d0f9e59f3 Step #1: ---> c9a969f468a9 Step #1: Step 3/4 : COPY build.sh $SRC/ Step #1: ---> 83a5bed9e61f Step #1: Step 4/4 : WORKDIR $SRC/gitea Step #1: ---> Running in ac70a2fad8ce Step #1: Removing intermediate container ac70a2fad8ce Step #1: ---> 9f996ebebc0c Step #1: Successfully built 9f996ebebc0c Step #1: Successfully tagged gcr.io/oss-fuzz/gitea:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gitea Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileGZyxAN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gitea/.git Step #2 - "srcmap": + GIT_DIR=/src/gitea Step #2 - "srcmap": + cd /src/gitea Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-gitea/gitea Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=aeb383025f90abcda7a9562684376b1996dcf3a5 Step #2 - "srcmap": + jq_inplace /tmp/fileGZyxAN '."/src/gitea" = { type: "git", url: "https://github.com/go-gitea/gitea", rev: "aeb383025f90abcda7a9562684376b1996dcf3a5" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileHZ96y9 Step #2 - "srcmap": + cat /tmp/fileGZyxAN Step #2 - "srcmap": + jq '."/src/gitea" = { type: "git", url: "https://github.com/go-gitea/gitea", rev: "aeb383025f90abcda7a9562684376b1996dcf3a5" }' Step #2 - "srcmap": + mv /tmp/fileHZ96y9 /tmp/fileGZyxAN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileGZyxAN Step #2 - "srcmap": + rm /tmp/fileGZyxAN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gitea": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-gitea/gitea", Step #2 - "srcmap": "rev": "aeb383025f90abcda7a9562684376b1996dcf3a5" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer code.gitea.io/gitea/tests/fuzz FuzzMarkdownRenderRaw fuzz_markdown_render_raw gofuzz Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/chroma/v2 v2.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/microcosm-cc/bluemonday v1.0.26 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yuin/goldmark-meta v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yuin/goldmark-highlighting/v2 v2.0.0-20230729083705-37449abec8cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yuin/goldmark v1.5.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading mvdan.cc/xurls/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dustin/go-humanize v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-fed/httpsig v1.1.1-0.20201223112313-55836744818e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/glob v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/sha256-simd v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru/v2 v2.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/djherbis/buffer v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/djherbis/nio/v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-enry/go-enry/v2 v2.8.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/6543/go-version v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20230926050212-f7f687d19a98 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gitea.com/go-chi/cache v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/v9 v9.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aymerick/douceur v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/goleveldb v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/css v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/unknwon/com v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bradfitz/gomemcache v0.0.0-20230905024940-24af94b03874 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dlclark/regexp2 v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer code.gitea.io/gitea/tests/fuzz FuzzMarkupPostProcess fuzz_markup_post_process gofuzz Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 6a031355e5a4: Already exists Step #4: 0b72f79bb618: Already exists Step #4: 48309ce267bd: Pulling fs layer Step #4: e09ac2b3f6b3: Pulling fs layer Step #4: 39a0c0d1e290: Pulling fs layer Step #4: 91adbb310e8d: Pulling fs layer Step #4: ed6b3c326a1b: Pulling fs layer Step #4: 73bd6cab534e: Pulling fs layer Step #4: b190278ad3f4: Pulling fs layer Step #4: 49123a15c4e4: Pulling fs layer Step #4: abf664782093: Pulling fs layer Step #4: 5e2f00bf0c5d: Pulling fs layer Step #4: cd7076eedf06: Pulling fs layer Step #4: b97d83ac024a: Pulling fs layer Step #4: ba3c82927d90: Pulling fs layer Step #4: 893e25d78a25: Pulling fs layer Step #4: b190278ad3f4: Waiting Step #4: ed6b3c326a1b: Waiting Step #4: 91adbb310e8d: Waiting Step #4: 73bd6cab534e: Waiting Step #4: 49123a15c4e4: Waiting Step #4: cd7076eedf06: Waiting Step #4: abf664782093: Waiting Step #4: 5e2f00bf0c5d: Waiting Step #4: b97d83ac024a: Waiting Step #4: ba3c82927d90: Waiting Step #4: 893e25d78a25: Waiting Step #4: 39a0c0d1e290: Download complete Step #4: 48309ce267bd: Verifying Checksum Step #4: 48309ce267bd: Download complete Step #4: e09ac2b3f6b3: Verifying Checksum Step #4: e09ac2b3f6b3: Download complete Step #4: ed6b3c326a1b: Verifying Checksum Step #4: ed6b3c326a1b: Download complete Step #4: 73bd6cab534e: Verifying Checksum Step #4: 73bd6cab534e: Download complete Step #4: b190278ad3f4: Verifying Checksum Step #4: b190278ad3f4: Download complete Step #4: 48309ce267bd: Pull complete Step #4: abf664782093: Download complete Step #4: 49123a15c4e4: Verifying Checksum Step #4: 49123a15c4e4: Download complete Step #4: cd7076eedf06: Verifying Checksum Step #4: cd7076eedf06: Download complete Step #4: e09ac2b3f6b3: Pull complete Step #4: b97d83ac024a: Verifying Checksum Step #4: b97d83ac024a: Download complete Step #4: 39a0c0d1e290: Pull complete Step #4: 91adbb310e8d: Download complete Step #4: 893e25d78a25: Download complete Step #4: 5e2f00bf0c5d: Verifying Checksum Step #4: 5e2f00bf0c5d: Download complete Step #4: ba3c82927d90: Verifying Checksum Step #4: ba3c82927d90: Download complete Step #4: 91adbb310e8d: Pull complete Step #4: ed6b3c326a1b: Pull complete Step #4: 73bd6cab534e: Pull complete Step #4: b190278ad3f4: Pull complete Step #4: 49123a15c4e4: Pull complete Step #4: abf664782093: Pull complete Step #4: 5e2f00bf0c5d: Pull complete Step #4: cd7076eedf06: Pull complete Step #4: b97d83ac024a: Pull complete Step #4: ba3c82927d90: Pull complete Step #4: 893e25d78a25: Pull complete Step #4: Digest: sha256:fbb9b29ba3f99c35318014bc039cdf4fc83059de2500c89832cce3d2d5cc98c7 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target fuzz_markdown_render_raw Step #5: Running go target fuzz_markup_post_process Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2023/12/10 06:17:16 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2023/12/10 06:17:16 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Step #9: ***** NOTICE ***** Step #9: Step #9: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #9: platforms, can be found at Step #9: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #9: Step #9: Suggested alternative images include: Step #9: Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #9: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #9: Step #9: Please note that the `gsutil` entrypoint must be specified when using these Step #9: images. Step #9: Step #9: ***** END OF NOTICE ***** Step #9: Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [0/3 files][ 0.0 B/ 842.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_markup_post_process.json [Content-Type=application/json]... Step #9: / [0/3 files][ 0.0 B/ 842.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_markdown_render_raw.json [Content-Type=application/json]... Step #9: / [0/3 files][ 0.0 B/ 842.0 B] 0% Done / [1/3 files][ 842.0 B/ 842.0 B] 99% Done / [2/3 files][ 842.0 B/ 842.0 B] 99% Done / [3/3 files][ 842.0 B/ 842.0 B] 100% Done Step #9: Operation completed over 3 objects/842.0 B. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_markdown_render_raw.log [Content-Type=application/octet-stream]... Step #11: / [0/2 files][ 0.0 B/ 62.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_markup_post_process.log [Content-Type=application/octet-stream]... Step #11: / [0/2 files][ 0.0 B/ 62.0 B] 0% Done / [1/2 files][ 62.0 B/ 62.0 B] 99% Done / [2/2 files][ 62.0 B/ 62.0 B] 100% Done Step #11: Operation completed over 2 objects/62.0 B. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 147.0 B] / [1 files][ 147.0 B/ 147.0 B] Step #12: Operation completed over 1 objects/147.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 303 0 0 100 303 0 1456 --:--:-- --:--:-- --:--:-- 1456 100 303 0 0 100 303 0 1278 --:--:-- --:--:-- --:--:-- 1278 Finished Step #13 PUSH DONE