starting build "8b60614e-0369-4c4e-a2aa-a7499daac2ab" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b" Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Sending build context to Docker daemon 5.12kB Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b549f31133a9: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fda11c351fde: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": bde827a1238f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 47fe9ac47af0: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6ceb804ebe72: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 141570139e07: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7d296ced577f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5b2ecca66c2f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 830012418f5b: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 0a16326ab986: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5125300fde52: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1aa11dc3e76d: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1e66ea6b371f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5b2ecca66c2f: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6d49e1f18e65: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 141570139e07: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7d296ced577f: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 47fe9ac47af0: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c92bca758a75: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 46902f44dc57: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 830012418f5b: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 201bb7da5556: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 0a16326ab986: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfba8a420bca: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 59f39204ed7b: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5125300fde52: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7c9fbc0a1857: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": a30961f2bf4f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1aa11dc3e76d: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c402a9f56a02: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1e66ea6b371f: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": d2dcd451dd41: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c92bca758a75: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 293dc2fd7cd1: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6d49e1f18e65: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6ceb804ebe72: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": e7ed01e7f728: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfba8a420bca: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1c33a6b26d40: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 46902f44dc57: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 59f39204ed7b: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7c9fbc0a1857: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 201bb7da5556: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 293dc2fd7cd1: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": db6a3fe9e62e: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c402a9f56a02: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": e7ed01e7f728: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": d2dcd451dd41: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": f1feef9cbb2d: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": a30961f2bf4f: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1c33a6b26d40: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6c3bfcbfdc6c: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfbeeab1e81d: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1dff8f3a3f3a: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 046fd3128fec: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": db6a3fe9e62e: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 033a1029635f: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfbeeab1e81d: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 517bd38fc9ea: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6c3bfcbfdc6c: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1dff8f3a3f3a: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1bed9f25f8bf: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 8e4aa989bb76: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 046fd3128fec: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": f1feef9cbb2d: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 033a1029635f: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1bed9f25f8bf: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 69f495d9e75e: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 517bd38fc9ea: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 8e4aa989bb76: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ad6eb50aef31: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b49e4f6e7f47: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c4709f2425fe: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fd68e21b8df5: Pulling fs layer Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b49e4f6e7f47: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fd68e21b8df5: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c4709f2425fe: Waiting Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": bde827a1238f: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": bde827a1238f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b549f31133a9: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b549f31133a9: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 47fe9ac47af0: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 47fe9ac47af0: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6ceb804ebe72: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6ceb804ebe72: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 141570139e07: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 141570139e07: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5b2ecca66c2f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fda11c351fde: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fda11c351fde: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 830012418f5b: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 830012418f5b: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b549f31133a9: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5125300fde52: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5125300fde52: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1aa11dc3e76d: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1aa11dc3e76d: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1e66ea6b371f: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1e66ea6b371f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6d49e1f18e65: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6d49e1f18e65: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 0a16326ab986: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 0a16326ab986: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c92bca758a75: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c92bca758a75: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 46902f44dc57: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 46902f44dc57: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfba8a420bca: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfba8a420bca: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 201bb7da5556: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 201bb7da5556: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7c9fbc0a1857: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7c9fbc0a1857: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 59f39204ed7b: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 59f39204ed7b: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c402a9f56a02: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c402a9f56a02: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": a30961f2bf4f: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": a30961f2bf4f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7d296ced577f: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7d296ced577f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 293dc2fd7cd1: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 293dc2fd7cd1: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": e7ed01e7f728: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": e7ed01e7f728: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": d2dcd451dd41: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": d2dcd451dd41: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1c33a6b26d40: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": db6a3fe9e62e: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": db6a3fe9e62e: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": f1feef9cbb2d: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": f1feef9cbb2d: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6c3bfcbfdc6c: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6c3bfcbfdc6c: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1dff8f3a3f3a: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfbeeab1e81d: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfbeeab1e81d: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 046fd3128fec: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 046fd3128fec: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fda11c351fde: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 033a1029635f: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 033a1029635f: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": bde827a1238f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 517bd38fc9ea: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 517bd38fc9ea: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1bed9f25f8bf: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1bed9f25f8bf: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 8e4aa989bb76: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 8e4aa989bb76: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b49e4f6e7f47: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ad6eb50aef31: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ad6eb50aef31: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 69f495d9e75e: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 69f495d9e75e: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fd68e21b8df5: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fd68e21b8df5: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 47fe9ac47af0: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6ceb804ebe72: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 141570139e07: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c4709f2425fe: Verifying Checksum Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c4709f2425fe: Download complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7d296ced577f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5b2ecca66c2f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 830012418f5b: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 0a16326ab986: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 5125300fde52: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1aa11dc3e76d: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1e66ea6b371f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6d49e1f18e65: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c92bca758a75: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 46902f44dc57: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 201bb7da5556: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfba8a420bca: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 59f39204ed7b: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 7c9fbc0a1857: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": a30961f2bf4f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c402a9f56a02: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": d2dcd451dd41: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 293dc2fd7cd1: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": e7ed01e7f728: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1c33a6b26d40: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": db6a3fe9e62e: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": f1feef9cbb2d: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 6c3bfcbfdc6c: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": cfbeeab1e81d: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1dff8f3a3f3a: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 046fd3128fec: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 033a1029635f: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 517bd38fc9ea: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 1bed9f25f8bf: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 8e4aa989bb76: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": 69f495d9e75e: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ad6eb50aef31: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": b49e4f6e7f47: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": c4709f2425fe: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": fd68e21b8df5: Pull complete Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Digest: sha256:883bb3bb561d560bf5147be95d777a8ff29e5ddc13519e45fad9419d67036206 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> 3cb9452d081a Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 2/6 : RUN git clone --depth 1 https://github.com/sigstore/rekor Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> Running in 75afa3253d01 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Cloning into 'rekor'... Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Removing intermediate container 75afa3253d01 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> 74c41130d19d Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 3/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> Running in faf6ce5d31f2 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Cloning into 'instrumentation'... Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Removing intermediate container faf6ce5d31f2 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> b0214c7926d9 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 4/6 : RUN git clone --depth=1 https://github.com/sassoftware/relic Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> Running in 36c4075c0ee2 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Cloning into 'relic'... Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Removing intermediate container 36c4075c0ee2 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> 00a594066be2 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 5/6 : COPY build.sh $SRC Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> 0cad317377e3 Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Step 6/6 : WORKDIR $SRC/rekor/pkg Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> Running in 156a1440e19c Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Removing intermediate container 156a1440e19c Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": ---> f7b237875b6c Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Successfully built f7b237875b6c Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Successfully tagged gcr.io/oss-fuzz/rekor:latest Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/rekor:latest Finished Step #1 - "build-97b66434-eb41-4cd8-93f6-9255d190d09b" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/rekor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filefWJRuO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/relic/.git Step #2 - "srcmap": + GIT_DIR=/src/relic Step #2 - "srcmap": + cd /src/relic Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sassoftware/relic Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bdc9acbfe6a439c79e51d931bccf4d0e9e49f233 Step #2 - "srcmap": + jq_inplace /tmp/filefWJRuO '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filezrUXIa Step #2 - "srcmap": + cat /tmp/filefWJRuO Step #2 - "srcmap": + jq '."/src/relic" = { type: "git", url: "https://github.com/sassoftware/relic", rev: "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" }' Step #2 - "srcmap": + mv /tmp/filezrUXIa /tmp/filefWJRuO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/filefWJRuO '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileRoY6sH Step #2 - "srcmap": + cat /tmp/filefWJRuO Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/fileRoY6sH /tmp/filefWJRuO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/rekor/.git Step #2 - "srcmap": + GIT_DIR=/src/rekor Step #2 - "srcmap": + cd /src/rekor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/rekor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=422e8ec73cfdfee1bdbce2798413470876a2eae8 Step #2 - "srcmap": + jq_inplace /tmp/filefWJRuO '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "422e8ec73cfdfee1bdbce2798413470876a2eae8" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileHk5iOe Step #2 - "srcmap": + cat /tmp/filefWJRuO Step #2 - "srcmap": + jq '."/src/rekor" = { type: "git", url: "https://github.com/sigstore/rekor", rev: "422e8ec73cfdfee1bdbce2798413470876a2eae8" }' Step #2 - "srcmap": + mv /tmp/fileHk5iOe /tmp/filefWJRuO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filefWJRuO Step #2 - "srcmap": + rm /tmp/filefWJRuO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/relic": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sassoftware/relic", Step #2 - "srcmap": "rev": "bdc9acbfe6a439c79e51d931bccf4d0e9e49f233" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/rekor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/rekor", Step #2 - "srcmap": "rev": "422e8ec73cfdfee1bdbce2798413470876a2eae8" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXX=clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXX='clang++ -lresolv -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/rekor/tests/oss_fuzz.sh Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.24.1 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-sql-driver/mysql v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmoiron/sqlx v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/redis/go-redis/v9 v9.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/release-utils v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/runtime v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-chi/chi v4.1.2+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/viper v1.20.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/errors v0.22.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/profiler v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/protobuf-specs v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/go-homedir v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/loads v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-redis/redismock/v9 v9.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/DATA-DOG/go-sqlmock v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/strfmt v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20250408133849-7e4ce0ab07d0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jedisct1/go-minisign v0.0.0-20211028175153-1c139d1cc84b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/asaskevich/govalidator v0.0.0-20230301143203-a9d515a09cc2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.120.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-retryablehttp v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/validate v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-fuzz-headers-1 v0.0.0-20230919221257-8b5d3ce2d11d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic v7.2.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic/v7 v7.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/spec v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyberphone/json-canonicalization v0.0.0-20220623050100-57a0ce2678a7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/transparency-dev/merkle v0.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/trillian v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250603155806-513f23925822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/in-toto/in-toto-golang v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.73.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/veraison/go-cose v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/theupdateframework/go-tuf v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20250505200425-f936aa4a68b2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/secure-systems-lab/go-securesystemslib v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/mock v1.7.0-rc.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/ini.v1 v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-sqlite3 v1.14.24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/common-nighthawk/go-figure v0.0.0-20210622060536-734e95fb86be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sagikazarmark/locafero v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/afero v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/pubsub v1.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.238.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mongodb.org/mongo-driver v1.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/aws v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/azure v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.9.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-awskms/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go-gcpkms/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tink-crypto/tink-go/v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.step.sm/crypto v0.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gocloud.dev v0.40.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading filippo.io/edwards25519 v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.16.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lib/pq v1.10.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliercoder/go-rpm v0.0.0-20200122174316-8cb9fd9c31a8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/rpmpack v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/analysis v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20241210010833-40e02aabc2ad Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.14.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/letsencrypt/boulder v0.0.0-20240620165639-de9c06129bec Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-containerregistry v0.20.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.62.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dgryski/go-rendezvous v0.0.0-20200823014737-9f7001d12a5f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/ginkgo/v2 v2.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bsm/gomega v1.27.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250505200425-f936aa4a68b2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shibumi/go-pathspec v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/codahale/rfc6979 v0.0.0-20141003034818-6a90f24967eb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sourcegraph/conc v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/subosito/gotenv v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/vault/api v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jellydator/ttlcache/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.36.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.29.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/kms v1.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.55.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/kms v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/iam v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.20 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliergopher/cpio v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/pgzip v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ulikunitz/xz v0.5.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/storage v1.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cavaliercoder/badio v0.0.0-20160213150051-ce5280129e9e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/howeyc/gopass v0.0.0-20210920133722-c8aef6fb66ef Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zalando/go-keyring v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/parseutil v0.1.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-secure-stdlib/strutil v0.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/hcl v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.22.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.69 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.31 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.30.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.33.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.35 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/wire v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.17.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.58.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/longrunning v0.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/titanous/rocacheck v0.0.0-20171023193734-afe73141d399 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity/cache v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.einride.tech/aip v0.68.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go v68.0.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/nxadm/tail v1.4.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alessio/shellescape v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ryanuber/go-glob v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-sockaddr v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/detectors/gcp v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.35 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/xerrors v0.0.0-20240716161551-93cc26a95ae9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-replayers/grpcreplay v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-replayers/httpreplay v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.12.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.3.17 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.17.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmhodges/clock v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/tomb.v1 v1.0.0-20141024135613-dd632973f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/monitoring v1.24.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/cloudmock v0.50.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.32.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20241210054802-24370beab758 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/logging v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/trace v1.11.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20250326154945-ae57f3c0d45f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/vtprotobuf v0.6.1-0.20240319094008-0393e58bdf10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.13.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/martian/v3 v3.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spiffe/go-spiffe/v2 v2.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zeebo/errs v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.16.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.1-0.20220621161143-b0104c826a24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath/internal/testify v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-extensions-for-go/cache v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/keybase/go-keychain v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzHashedRekord(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzJarUnmarshal(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ProtonMail/go-crypto v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cloudflare/circl v1.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading software.sslmate.com/src/go-pkcs12 v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/s3 v1.71.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/zalando/go-keyring v0.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/danieljoos/wincred v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading al.essio.dev/pkg/shellescape v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/aws/protocol/eventstream v1.6.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.18.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.4.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/v4a v1.3.26 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/zipslicer Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/certloader Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/x509tools Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/passprompt Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/config Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/pkcs7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/signers/sigerrors Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/sassoftware/relic/v8/lib/binpatch Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/binpatch in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/x509tools in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/signers/sigerrors in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/passprompt in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs7 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/pkcs9 in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/config in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/certloader in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/sassoftware/relic/v8/lib/zipslicer in github.com/sassoftware/relic/v8 v8.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20250520111509-a70c2aa677fa Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/rekor/tests/fuzz-testdata/seeds/alpine/FuzzPackageUnmarshal/FuzzPackageUnmarshal_seed1 (deflated 98%) Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: fda11c351fde: Already exists Step #4: bde827a1238f: Already exists Step #4: 140fd3517c34: Pulling fs layer Step #4: 96aa938eb03e: Pulling fs layer Step #4: 3a56190a40cc: Pulling fs layer Step #4: b615500c2bbc: Pulling fs layer Step #4: 80667d18f987: Pulling fs layer Step #4: 4ae125a00b97: Pulling fs layer Step #4: ec8c5f3c3dcc: Pulling fs layer Step #4: a0d75a37d0e5: Pulling fs layer Step #4: 6f557737fcdb: Pulling fs layer Step #4: 520cd324e6bd: Pulling fs layer Step #4: f454ed755796: Pulling fs layer Step #4: 90aea261ea8c: Pulling fs layer Step #4: 44182b64cce5: Pulling fs layer Step #4: ae0ffe65c3ce: Pulling fs layer Step #4: 4d91cfddec85: Pulling fs layer Step #4: 0030f9a80ba9: Pulling fs layer Step #4: e910e64fbbec: Pulling fs layer Step #4: 60546b1b12f2: Pulling fs layer Step #4: 4bc136a5862a: Pulling fs layer Step #4: e77252f63d05: Pulling fs layer Step #4: 2d19611b6ea7: Pulling fs layer Step #4: 1a433f8acdab: Pulling fs layer Step #4: c58d55fc50ca: Pulling fs layer Step #4: 80667d18f987: Waiting Step #4: 4ae125a00b97: Waiting Step #4: ec8c5f3c3dcc: Waiting Step #4: a0d75a37d0e5: Waiting Step #4: 6f557737fcdb: Waiting Step #4: 520cd324e6bd: Waiting Step #4: f454ed755796: Waiting Step #4: 90aea261ea8c: Waiting Step #4: 44182b64cce5: Waiting Step #4: ae0ffe65c3ce: Waiting Step #4: 4d91cfddec85: Waiting Step #4: b615500c2bbc: Waiting Step #4: 0030f9a80ba9: Waiting Step #4: e910e64fbbec: Waiting Step #4: 1a433f8acdab: Waiting Step #4: c58d55fc50ca: Waiting Step #4: 4bc136a5862a: Waiting Step #4: 2d19611b6ea7: Waiting Step #4: 3a56190a40cc: Download complete Step #4: 140fd3517c34: Verifying Checksum Step #4: 140fd3517c34: Download complete Step #4: 96aa938eb03e: Verifying Checksum Step #4: 96aa938eb03e: Download complete Step #4: 140fd3517c34: Pull complete Step #4: 80667d18f987: Verifying Checksum Step #4: 80667d18f987: Download complete Step #4: b615500c2bbc: Verifying Checksum Step #4: b615500c2bbc: Download complete Step #4: a0d75a37d0e5: Verifying Checksum Step #4: a0d75a37d0e5: Download complete Step #4: ec8c5f3c3dcc: Download complete Step #4: 96aa938eb03e: Pull complete Step #4: 3a56190a40cc: Pull complete Step #4: 6f557737fcdb: Verifying Checksum Step #4: 6f557737fcdb: Download complete Step #4: 4ae125a00b97: Verifying Checksum Step #4: 4ae125a00b97: Download complete Step #4: b615500c2bbc: Pull complete Step #4: f454ed755796: Verifying Checksum Step #4: f454ed755796: Download complete Step #4: 90aea261ea8c: Verifying Checksum Step #4: 90aea261ea8c: Download complete Step #4: 80667d18f987: Pull complete Step #4: 44182b64cce5: Verifying Checksum Step #4: 44182b64cce5: Download complete Step #4: 520cd324e6bd: Verifying Checksum Step #4: 520cd324e6bd: Download complete Step #4: 4d91cfddec85: Verifying Checksum Step #4: 4d91cfddec85: Download complete Step #4: ae0ffe65c3ce: Verifying Checksum Step #4: ae0ffe65c3ce: Download complete Step #4: 60546b1b12f2: Verifying Checksum Step #4: 60546b1b12f2: Download complete Step #4: e910e64fbbec: Verifying Checksum Step #4: e910e64fbbec: Download complete Step #4: 4bc136a5862a: Download complete Step #4: e77252f63d05: Verifying Checksum Step #4: e77252f63d05: Download complete Step #4: 0030f9a80ba9: Verifying Checksum Step #4: 0030f9a80ba9: Download complete Step #4: 1a433f8acdab: Download complete Step #4: 2d19611b6ea7: Verifying Checksum Step #4: 2d19611b6ea7: Download complete Step #4: 4ae125a00b97: Pull complete Step #4: c58d55fc50ca: Verifying Checksum Step #4: c58d55fc50ca: Download complete Step #4: ec8c5f3c3dcc: Pull complete Step #4: a0d75a37d0e5: Pull complete Step #4: 6f557737fcdb: Pull complete Step #4: 520cd324e6bd: Pull complete Step #4: f454ed755796: Pull complete Step #4: 90aea261ea8c: Pull complete Step #4: 44182b64cce5: Pull complete Step #4: ae0ffe65c3ce: Pull complete Step #4: 4d91cfddec85: Pull complete Step #4: 0030f9a80ba9: Pull complete Step #4: e910e64fbbec: Pull complete Step #4: 60546b1b12f2: Pull complete Step #4: 4bc136a5862a: Pull complete Step #4: e77252f63d05: Pull complete Step #4: 2d19611b6ea7: Pull complete Step #4: 1a433f8acdab: Pull complete Step #4: c58d55fc50ca: Pull complete Step #4: Digest: sha256:dd0baa0e7c52d0bc227b78c8300339638fa60897a59689ddefc8a74dc7f9ff0a Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: warning [/corpus/FuzzAlpineCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzAlpineCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzAlpineUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzAlpineUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzCoseCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzCoseCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzCoseUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzCoseUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzCreateEntryIDFromParts.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzCreateEntryIDFromParts. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzDSSECreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzDSSECreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzDSSEUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzDSSEUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzGetTreeIDFromIDString.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzGetTreeIDFromIDString. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzGetUUIDFromIDString.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzGetUUIDFromIDString. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHashedRekordCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHashedRekordCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHashedRekordUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHashedRekordUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHelmCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHelmCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHelmProvenanceUnmarshal.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHelmProvenanceUnmarshal. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzHelmUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzHelmUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzIntotoCreateProposedEntry_v001.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzIntotoCreateProposedEntry_v001. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzIntotoCreateProposedEntry_v002.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzIntotoCreateProposedEntry_v002. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzIntotoUnmarshalAndCanonicalize_v001.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzIntotoUnmarshalAndCanonicalize_v001. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzIntotoUnmarshalAndCanonicalize_v002.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzIntotoUnmarshalAndCanonicalize_v002. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzJarCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzJarCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzJarUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzJarUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzJarutilsVerify.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzJarutilsVerify. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzKeys.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzKeys. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzNewFile.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzNewFile. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzPackageUnmarshal.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzPackageUnmarshal. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzPadToTreeIDLen.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzPadToTreeIDLen. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRekordCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRekordCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRekordUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRekordUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzReturnEntryIDString.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzReturnEntryIDString. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRfc3161CreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRfc3161CreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRfc3161UnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRfc3161UnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRpmCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRpmCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzRpmUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzRpmUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzTreeID.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzTreeID. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzTufCreateProposedEntry.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzTufCreateProposedEntry. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzTufUnmarshalAndCanonicalize.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzTufUnmarshalAndCanonicalize. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzValidateEntryID.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzValidateEntryID. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzValidateTreeID.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzValidateTreeID. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/FuzzValidateUUID.zip]: zipfile is empty Step #5: Failed to unpack the corpus for FuzzValidateUUID. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image rekor Step #5: python infra/helper.py build_fuzzers --sanitizer coverage rekor Step #5: python infra/helper.py coverage rekor Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1