starting build "7b3e38aa-bb94-4b16-89eb-25e6b720ccc0" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: be25b9522f79: Pulling fs layer Step #1: a9ab31d534e3: Pulling fs layer Step #1: 8c031fa7a8ef: Pulling fs layer Step #1: f191d822ab89: Pulling fs layer Step #1: 856d02d9c4bf: Pulling fs layer Step #1: 888fb4b2605b: Pulling fs layer Step #1: afd7e50f3d5f: Pulling fs layer Step #1: c5fc65aaddb2: Pulling fs layer Step #1: c3c9501819d9: Pulling fs layer Step #1: db14340da231: Pulling fs layer Step #1: 45f11e3b11db: Pulling fs layer Step #1: daa3a3db06fe: Pulling fs layer Step #1: 6a27899b6b7d: Pulling fs layer Step #1: 8c031fa7a8ef: Waiting Step #1: 804199997d04: Pulling fs layer Step #1: f191d822ab89: Waiting Step #1: 3cbf7f41ed20: Pulling fs layer Step #1: 856d02d9c4bf: Waiting Step #1: 389d7a6d22d9: Pulling fs layer Step #1: 38d1bb468957: Pulling fs layer Step #1: 020ffe020e0a: Pulling fs layer Step #1: ab01c9b84e20: Pulling fs layer Step #1: 7570e6b16473: Pulling fs layer Step #1: e1fb3a303bae: Pulling fs layer Step #1: a0438da8572a: Pulling fs layer Step #1: e7ced0680abe: Pulling fs layer Step #1: 75771a0541c6: Pulling fs layer Step #1: d167f50046c9: Pulling fs layer Step #1: deb850163241: Pulling fs layer Step #1: 45f11e3b11db: Waiting Step #1: 3856e262ee24: Pulling fs layer Step #1: 815562f87435: Pulling fs layer Step #1: 888fb4b2605b: Waiting Step #1: daa3a3db06fe: Waiting Step #1: 3fd13e0f290e: Pulling fs layer Step #1: 6a27899b6b7d: Waiting Step #1: ce414ebdd7ee: Pulling fs layer Step #1: 804199997d04: Waiting Step #1: 9f130a7b41b8: Pulling fs layer Step #1: c3c9501819d9: Waiting Step #1: f89e0b54daff: Pulling fs layer Step #1: db14340da231: Waiting Step #1: d86ac9ffb9a7: Pulling fs layer Step #1: afd7e50f3d5f: Waiting Step #1: 8091734681d6: Pulling fs layer Step #1: 0656abad12ca: Pulling fs layer Step #1: 2c7cd73ad987: Pulling fs layer Step #1: 3cbf7f41ed20: Waiting Step #1: c5fc65aaddb2: Waiting Step #1: 389d7a6d22d9: Waiting Step #1: 9f130a7b41b8: Waiting Step #1: 38d1bb468957: Waiting Step #1: 8091734681d6: Waiting Step #1: d167f50046c9: Waiting Step #1: 0656abad12ca: Waiting Step #1: 020ffe020e0a: Waiting Step #1: f89e0b54daff: Waiting Step #1: ab01c9b84e20: Waiting Step #1: 2c7cd73ad987: Waiting Step #1: deb850163241: Waiting Step #1: d86ac9ffb9a7: Waiting Step #1: 3856e262ee24: Waiting Step #1: e7ced0680abe: Waiting Step #1: ce414ebdd7ee: Waiting Step #1: 3fd13e0f290e: Waiting Step #1: 815562f87435: Waiting Step #1: e1fb3a303bae: Waiting Step #1: 75771a0541c6: Waiting Step #1: a0438da8572a: Waiting Step #1: a9ab31d534e3: Verifying Checksum Step #1: a9ab31d534e3: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f191d822ab89: Download complete Step #1: 8c031fa7a8ef: Verifying Checksum Step #1: 8c031fa7a8ef: Download complete Step #1: 856d02d9c4bf: Download complete Step #1: afd7e50f3d5f: Download complete Step #1: be25b9522f79: Verifying Checksum Step #1: be25b9522f79: Download complete Step #1: c5fc65aaddb2: Download complete Step #1: b549f31133a9: Pull complete Step #1: db14340da231: Verifying Checksum Step #1: db14340da231: Download complete Step #1: 45f11e3b11db: Verifying Checksum Step #1: 45f11e3b11db: Download complete Step #1: daa3a3db06fe: Verifying Checksum Step #1: daa3a3db06fe: Download complete Step #1: 6a27899b6b7d: Verifying Checksum Step #1: 6a27899b6b7d: Download complete Step #1: 804199997d04: Verifying Checksum Step #1: 804199997d04: Download complete Step #1: 3cbf7f41ed20: Download complete Step #1: c3c9501819d9: Verifying Checksum Step #1: c3c9501819d9: Download complete Step #1: 389d7a6d22d9: Verifying Checksum Step #1: 389d7a6d22d9: Download complete Step #1: 38d1bb468957: Verifying Checksum Step #1: 38d1bb468957: Download complete Step #1: 020ffe020e0a: Verifying Checksum Step #1: 020ffe020e0a: Download complete Step #1: ab01c9b84e20: Verifying Checksum Step #1: ab01c9b84e20: Download complete Step #1: e1fb3a303bae: Verifying Checksum Step #1: e1fb3a303bae: Download complete Step #1: 7570e6b16473: Verifying Checksum Step #1: 7570e6b16473: Download complete Step #1: e7ced0680abe: Verifying Checksum Step #1: e7ced0680abe: Download complete Step #1: a0438da8572a: Verifying Checksum Step #1: a0438da8572a: Download complete Step #1: 75771a0541c6: Verifying Checksum Step #1: 75771a0541c6: Download complete Step #1: 888fb4b2605b: Verifying Checksum Step #1: 888fb4b2605b: Download complete Step #1: d167f50046c9: Download complete Step #1: deb850163241: Verifying Checksum Step #1: deb850163241: Download complete Step #1: 3856e262ee24: Verifying Checksum Step #1: 3856e262ee24: Download complete Step #1: 815562f87435: Verifying Checksum Step #1: 815562f87435: Download complete Step #1: ce414ebdd7ee: Download complete Step #1: 9f130a7b41b8: Download complete Step #1: 3fd13e0f290e: Verifying Checksum Step #1: 3fd13e0f290e: Download complete Step #1: f89e0b54daff: Verifying Checksum Step #1: f89e0b54daff: Download complete Step #1: d86ac9ffb9a7: Download complete Step #1: 8091734681d6: Verifying Checksum Step #1: 8091734681d6: Download complete Step #1: 2c7cd73ad987: Download complete Step #1: be25b9522f79: Pull complete Step #1: a9ab31d534e3: Pull complete Step #1: 8c031fa7a8ef: Pull complete Step #1: 0656abad12ca: Verifying Checksum Step #1: 0656abad12ca: Download complete Step #1: f191d822ab89: Pull complete Step #1: 856d02d9c4bf: Pull complete Step #1: 888fb4b2605b: Pull complete Step #1: afd7e50f3d5f: Pull complete Step #1: c5fc65aaddb2: Pull complete Step #1: c3c9501819d9: Pull complete Step #1: db14340da231: Pull complete Step #1: 45f11e3b11db: Pull complete Step #1: daa3a3db06fe: Pull complete Step #1: 6a27899b6b7d: Pull complete Step #1: 804199997d04: Pull complete Step #1: 3cbf7f41ed20: Pull complete Step #1: 389d7a6d22d9: Pull complete Step #1: 38d1bb468957: Pull complete Step #1: 020ffe020e0a: Pull complete Step #1: ab01c9b84e20: Pull complete Step #1: 7570e6b16473: Pull complete Step #1: e1fb3a303bae: Pull complete Step #1: a0438da8572a: Pull complete Step #1: e7ced0680abe: Pull complete Step #1: 75771a0541c6: Pull complete Step #1: d167f50046c9: Pull complete Step #1: deb850163241: Pull complete Step #1: 3856e262ee24: Pull complete Step #1: 815562f87435: Pull complete Step #1: 3fd13e0f290e: Pull complete Step #1: ce414ebdd7ee: Pull complete Step #1: 9f130a7b41b8: Pull complete Step #1: f89e0b54daff: Pull complete Step #1: d86ac9ffb9a7: Pull complete Step #1: 8091734681d6: Pull complete Step #1: 0656abad12ca: Pull complete Step #1: 2c7cd73ad987: Pull complete Step #1: Digest: sha256:670b66c40cfa4a99256e07e5ade9e14dbf6eea779754ed86a8c509dae565cd0f Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 8124d1bff02a Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/google/go-cmp Step #1: ---> Running in 9b20415675d8 Step #1: Cloning into 'go-cmp'... Step #1: Removing intermediate container 9b20415675d8 Step #1: ---> a3830c36ab88 Step #1: Step 3/4 : WORKDIR go-cmp Step #1: ---> Running in 3bdbedace574 Step #1: Removing intermediate container 3bdbedace574 Step #1: ---> 763dd9ea0983 Step #1: Step 4/4 : COPY build.sh fuzz_test.go $SRC/ Step #1: ---> 219ac738ef17 Step #1: Successfully built 219ac738ef17 Step #1: Successfully tagged gcr.io/oss-fuzz/go-cmp:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-cmp Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileYnb3XO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-cmp/.git Step #2 - "srcmap": + GIT_DIR=/src/go-cmp Step #2 - "srcmap": + cd /src/go-cmp Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/go-cmp Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=9b12f366a942ebc7254abc7f32ca05068b455fb7 Step #2 - "srcmap": + jq_inplace /tmp/fileYnb3XO '."/src/go-cmp" = { type: "git", url: "https://github.com/google/go-cmp", rev: "9b12f366a942ebc7254abc7f32ca05068b455fb7" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filelPYM6a Step #2 - "srcmap": + cat /tmp/fileYnb3XO Step #2 - "srcmap": + jq '."/src/go-cmp" = { type: "git", url: "https://github.com/google/go-cmp", rev: "9b12f366a942ebc7254abc7f32ca05068b455fb7" }' Step #2 - "srcmap": + mv /tmp/filelPYM6a /tmp/fileYnb3XO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileYnb3XO Step #2 - "srcmap": + rm /tmp/fileYnb3XO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-cmp": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/go-cmp", Step #2 - "srcmap": "rev": "9b12f366a942ebc7254abc7f32ca05068b455fb7" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/fuzz_test.go ./cmp/ Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package cmp\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/google/go-cmp/cmp FuzzDiff FuzzDiff Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: be25b9522f79: Already exists Step #4: a9ab31d534e3: Already exists Step #4: e307f19c1e09: Pulling fs layer Step #4: 11c71d37abe9: Pulling fs layer Step #4: 2ad96dc357c4: Pulling fs layer Step #4: 0758c49fa0c1: Pulling fs layer Step #4: b347511dd7b0: Pulling fs layer Step #4: 06f5344512b1: Pulling fs layer Step #4: a4e8ef7ce85c: Pulling fs layer Step #4: 2d8a2b0735b2: Pulling fs layer Step #4: 19668efd01c9: Pulling fs layer Step #4: 622a83ca72e5: Pulling fs layer Step #4: 799b5f0a8c4b: Pulling fs layer Step #4: 18aab460a6c6: Pulling fs layer Step #4: 4ad4cff91659: Pulling fs layer Step #4: add6bb120575: Pulling fs layer Step #4: 92f4e198b5ba: Pulling fs layer Step #4: 2513076cf804: Pulling fs layer Step #4: eee1d28b10d1: Pulling fs layer Step #4: 2977e55add29: Pulling fs layer Step #4: a5ab293f5d92: Pulling fs layer Step #4: 9a2cd02ad451: Pulling fs layer Step #4: 6f93d942269b: Pulling fs layer Step #4: e04d678ded4d: Pulling fs layer Step #4: 74fcd14b0bd2: Pulling fs layer Step #4: 0758c49fa0c1: Waiting Step #4: add6bb120575: Waiting Step #4: b347511dd7b0: Waiting Step #4: 06f5344512b1: Waiting Step #4: 9a2cd02ad451: Waiting Step #4: a4e8ef7ce85c: Waiting Step #4: 6f93d942269b: Waiting Step #4: e04d678ded4d: Waiting Step #4: 92f4e198b5ba: Waiting Step #4: 2d8a2b0735b2: Waiting Step #4: 74fcd14b0bd2: Waiting Step #4: 19668efd01c9: Waiting Step #4: 2513076cf804: Waiting Step #4: 622a83ca72e5: Waiting Step #4: 799b5f0a8c4b: Waiting Step #4: a5ab293f5d92: Waiting Step #4: eee1d28b10d1: Waiting Step #4: 2977e55add29: Waiting Step #4: 18aab460a6c6: Waiting Step #4: 2ad96dc357c4: Download complete Step #4: e307f19c1e09: Verifying Checksum Step #4: e307f19c1e09: Download complete Step #4: 11c71d37abe9: Verifying Checksum Step #4: 11c71d37abe9: Download complete Step #4: b347511dd7b0: Verifying Checksum Step #4: b347511dd7b0: Download complete Step #4: e307f19c1e09: Pull complete Step #4: 0758c49fa0c1: Verifying Checksum Step #4: 0758c49fa0c1: Download complete Step #4: a4e8ef7ce85c: Verifying Checksum Step #4: a4e8ef7ce85c: Download complete Step #4: 2d8a2b0735b2: Verifying Checksum Step #4: 2d8a2b0735b2: Download complete Step #4: 19668efd01c9: Verifying Checksum Step #4: 19668efd01c9: Download complete Step #4: 11c71d37abe9: Pull complete Step #4: 2ad96dc357c4: Pull complete Step #4: 06f5344512b1: Verifying Checksum Step #4: 06f5344512b1: Download complete Step #4: 799b5f0a8c4b: Download complete Step #4: 18aab460a6c6: Verifying Checksum Step #4: 18aab460a6c6: Download complete Step #4: 4ad4cff91659: Download complete Step #4: 0758c49fa0c1: Pull complete Step #4: 92f4e198b5ba: Verifying Checksum Step #4: 92f4e198b5ba: Download complete Step #4: b347511dd7b0: Pull complete Step #4: 622a83ca72e5: Verifying Checksum Step #4: 622a83ca72e5: Download complete Step #4: add6bb120575: Verifying Checksum Step #4: add6bb120575: Download complete Step #4: 2977e55add29: Verifying Checksum Step #4: 2977e55add29: Download complete Step #4: eee1d28b10d1: Verifying Checksum Step #4: eee1d28b10d1: Download complete Step #4: a5ab293f5d92: Verifying Checksum Step #4: a5ab293f5d92: Download complete Step #4: 9a2cd02ad451: Verifying Checksum Step #4: 9a2cd02ad451: Download complete Step #4: 2513076cf804: Verifying Checksum Step #4: 2513076cf804: Download complete Step #4: 6f93d942269b: Verifying Checksum Step #4: 6f93d942269b: Download complete Step #4: e04d678ded4d: Download complete Step #4: 06f5344512b1: Pull complete Step #4: 74fcd14b0bd2: Verifying Checksum Step #4: 74fcd14b0bd2: Download complete Step #4: a4e8ef7ce85c: Pull complete Step #4: 2d8a2b0735b2: Pull complete Step #4: 19668efd01c9: Pull complete Step #4: 622a83ca72e5: Pull complete Step #4: 799b5f0a8c4b: Pull complete Step #4: 18aab460a6c6: Pull complete Step #4: 4ad4cff91659: Pull complete Step #4: add6bb120575: Pull complete Step #4: 92f4e198b5ba: Pull complete Step #4: 2513076cf804: Pull complete Step #4: eee1d28b10d1: Pull complete Step #4: 2977e55add29: Pull complete Step #4: a5ab293f5d92: Pull complete Step #4: 9a2cd02ad451: Pull complete Step #4: 6f93d942269b: Pull complete Step #4: e04d678ded4d: Pull complete Step #4: 74fcd14b0bd2: Pull complete Step #4: Digest: sha256:d7de103307d3831089e3e615d8d24ceac1ba53be091a6ca0ffb4670204170fff Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target FuzzDiff Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running FuzzDiff: Step #5: --- FAIL: TestDiff (0.00s) Step #5: panic: open testdata/diffs: no such file or directory [recovered] Step #5: panic: open testdata/diffs: no such file or directory Step #5: Step #5: goroutine 56 [running]: Step #5: testing.tRunner.func1.2({0x6a2a80, 0xc0002309f0}) Step #5: /root/.go/src/testing/testing.go:1632 +0x230 Step #5: testing.tRunner.func1() Step #5: /root/.go/src/testing/testing.go:1635 +0x35e Step #5: panic({0x6a2a80?, 0xc0002309f0?}) Step #5: /root/.go/src/runtime/panic.go:785 +0x132 Step #5: github.com/google/go-cmp/cmp_test.mustParseGolden({0x6e4cf4?, 0x8cc898?}) Step #5: /src/go-cmp/cmp/compare_test.go:63 +0x3a5 Step #5: github.com/google/go-cmp/cmp_test.TestDiff(0xc0001d0340) Step #5: /src/go-cmp/cmp/compare_test.go:139 +0x6ab Step #5: testing.tRunner(0xc0001d0340, 0x6fdae8) Step #5: /root/.go/src/testing/testing.go:1690 +0xf4 Step #5: created by testing.(*T).Run in goroutine 1 Step #5: /root/.go/src/testing/testing.go:1743 +0x390 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/FuzzDiff.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/FuzzDiff.profdata: No such file or directory Step #5: 2025/03/15 06:25:41 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/FuzzDiff.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/03/15 06:25:41 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: no such file or directory Step #5: 2025/03/15 06:25:41 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/03/15 06:25:41 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/ 4.9 KiB] 0% Done / [1/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [2/3 files][ 4.9 KiB/ 4.9 KiB] 99% Done / [3/3 files][ 4.9 KiB/ 4.9 KiB] 100% Done Step #7: Operation completed over 3 objects/4.9 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDiff.json [Content-Type=application/json]... Step #9: / [0/2 files][ 0.0 B/ 9.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [0/2 files][ 0.0 B/ 9.0 B] 0% Done / [1/2 files][ 9.0 B/ 9.0 B] 99% Done / [2/2 files][ 9.0 B/ 9.0 B] 100% Done Step #9: Operation completed over 2 objects/9.0 B. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDiff.log [Content-Type=application/octet-stream]... Step #11: / [0/1 files][ 0.0 B/ 808.0 B] 0% Done / [1/1 files][ 808.0 B/ 808.0 B] 100% Done Step #11: Operation completed over 1 objects/808.0 B. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Step #12: ***** NOTICE ***** Step #12: Step #12: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #12: platforms, can be found at Step #12: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #12: Step #12: Suggested alternative images include: Step #12: Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #12: Step #12: Please note that the `gsutil` entrypoint must be specified when using these Step #12: images. Step #12: Step #12: ***** END OF NOTICE ***** Step #12: Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 147.0 B] / [1 files][ 147.0 B/ 147.0 B] Step #12: Operation completed over 1 objects/147.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 306 0 0 100 306 0 1485 --:--:-- --:--:-- --:--:-- 1485 100 306 0 0 100 306 0 1410 --:--:-- --:--:-- --:--:-- 1410 Finished Step #13 PUSH DONE