starting build "a9e2576f-5e16-4c75-a3fb-c2456e2ec60f"

FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: 
Step #0:                    ***** NOTICE *****
Step #0: 
Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple
Step #0: platforms, can be found at
Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable
Step #0: for some use cases when interacting with Cloud Source Repositories.
Step #0: 
Step #0: For additional information, please visit
Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git
Step #0: 
Step #0:                 ***** END OF NOTICE *****
Step #0: 
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon  5.632kB

Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go
Step #1: latest: Pulling from oss-fuzz-base/base-builder-go
Step #1: b549f31133a9: Pulling fs layer
Step #1: 800687449569: Pulling fs layer
Step #1: 67cc84ed39bf: Pulling fs layer
Step #1: 33c4464df317: Pulling fs layer
Step #1: 7a3d59ffed63: Pulling fs layer
Step #1: bc24bccd8f7c: Pulling fs layer
Step #1: 18d20619fb8d: Pulling fs layer
Step #1: 0ec212d79142: Pulling fs layer
Step #1: 0d731e844f5b: Pulling fs layer
Step #1: 03e6d4298870: Pulling fs layer
Step #1: 9cb6c9480ffe: Pulling fs layer
Step #1: 636367483a85: Pulling fs layer
Step #1: ab160a08f40f: Pulling fs layer
Step #1: d56fb1501120: Pulling fs layer
Step #1: 6e5ee80d4b76: Pulling fs layer
Step #1: 069b70ca1828: Pulling fs layer
Step #1: 082a5c4ba783: Pulling fs layer
Step #1: aeb889ce9374: Pulling fs layer
Step #1: b3c77a307741: Pulling fs layer
Step #1: 19afa95abd0d: Pulling fs layer
Step #1: 3331bfca5447: Pulling fs layer
Step #1: ca89507fe8d3: Pulling fs layer
Step #1: 093d0a8d4813: Pulling fs layer
Step #1: 562130e5e1f0: Pulling fs layer
Step #1: c78d65770fdc: Pulling fs layer
Step #1: d8a48a39f3bb: Pulling fs layer
Step #1: d547270a8392: Pulling fs layer
Step #1: cd72b15f7674: Pulling fs layer
Step #1: fed123fa2f8a: Pulling fs layer
Step #1: 39a8609a58c5: Pulling fs layer
Step #1: d942b3144a95: Pulling fs layer
Step #1: 30e6af2af1c7: Pulling fs layer
Step #1: a9e61f79d57c: Pulling fs layer
Step #1: bc24bccd8f7c: Waiting
Step #1: 18d20619fb8d: Waiting
Step #1: 0ec212d79142: Waiting
Step #1: 0d731e844f5b: Waiting
Step #1: ca89507fe8d3: Waiting
Step #1: 03e6d4298870: Waiting
Step #1: 093d0a8d4813: Waiting
Step #1: 9cb6c9480ffe: Waiting
Step #1: 562130e5e1f0: Waiting
Step #1: 636367483a85: Waiting
Step #1: c78d65770fdc: Waiting
Step #1: ab160a08f40f: Waiting
Step #1: d56fb1501120: Waiting
Step #1: d8a48a39f3bb: Waiting
Step #1: d547270a8392: Waiting
Step #1: cd72b15f7674: Waiting
Step #1: 6e5ee80d4b76: Waiting
Step #1: 069b70ca1828: Waiting
Step #1: 33c4464df317: Waiting
Step #1: 082a5c4ba783: Waiting
Step #1: aeb889ce9374: Waiting
Step #1: b3c77a307741: Waiting
Step #1: fed123fa2f8a: Waiting
Step #1: 19afa95abd0d: Waiting
Step #1: 39a8609a58c5: Waiting
Step #1: 3331bfca5447: Waiting
Step #1: d942b3144a95: Waiting
Step #1: 30e6af2af1c7: Waiting
Step #1: a9e61f79d57c: Waiting
Step #1: 7a3d59ffed63: Waiting
Step #1: 67cc84ed39bf: Verifying Checksum
Step #1: 67cc84ed39bf: Download complete
Step #1: b549f31133a9: Download complete
Step #1: 33c4464df317: Verifying Checksum
Step #1: 33c4464df317: Download complete
Step #1: bc24bccd8f7c: Verifying Checksum
Step #1: bc24bccd8f7c: Download complete
Step #1: 7a3d59ffed63: Verifying Checksum
Step #1: 7a3d59ffed63: Download complete
Step #1: 0ec212d79142: Verifying Checksum
Step #1: 0ec212d79142: Download complete
Step #1: 0d731e844f5b: Verifying Checksum
Step #1: 0d731e844f5b: Download complete
Step #1: 800687449569: Download complete
Step #1: 9cb6c9480ffe: Verifying Checksum
Step #1: 9cb6c9480ffe: Download complete
Step #1: 636367483a85: Verifying Checksum
Step #1: 636367483a85: Download complete
Step #1: ab160a08f40f: Verifying Checksum
Step #1: ab160a08f40f: Download complete
Step #1: d56fb1501120: Verifying Checksum
Step #1: d56fb1501120: Download complete
Step #1: 6e5ee80d4b76: Verifying Checksum
Step #1: 6e5ee80d4b76: Download complete
Step #1: 069b70ca1828: Verifying Checksum
Step #1: 069b70ca1828: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: 082a5c4ba783: Download complete
Step #1: aeb889ce9374: Verifying Checksum
Step #1: aeb889ce9374: Download complete
Step #1: b3c77a307741: Verifying Checksum
Step #1: b3c77a307741: Download complete
Step #1: 19afa95abd0d: Verifying Checksum
Step #1: 19afa95abd0d: Download complete
Step #1: 3331bfca5447: Verifying Checksum
Step #1: 3331bfca5447: Download complete
Step #1: 03e6d4298870: Verifying Checksum
Step #1: 03e6d4298870: Download complete
Step #1: 093d0a8d4813: Download complete
Step #1: ca89507fe8d3: Verifying Checksum
Step #1: ca89507fe8d3: Download complete
Step #1: 562130e5e1f0: Verifying Checksum
Step #1: 562130e5e1f0: Download complete
Step #1: c78d65770fdc: Download complete
Step #1: d8a48a39f3bb: Verifying Checksum
Step #1: d8a48a39f3bb: Download complete
Step #1: d547270a8392: Verifying Checksum
Step #1: d547270a8392: Download complete
Step #1: cd72b15f7674: Verifying Checksum
Step #1: cd72b15f7674: Download complete
Step #1: fed123fa2f8a: Download complete
Step #1: 39a8609a58c5: Verifying Checksum
Step #1: 39a8609a58c5: Download complete
Step #1: d942b3144a95: Download complete
Step #1: a9e61f79d57c: Verifying Checksum
Step #1: a9e61f79d57c: Download complete
Step #1: 18d20619fb8d: Verifying Checksum
Step #1: 18d20619fb8d: Download complete
Step #1: 30e6af2af1c7: Verifying Checksum
Step #1: 30e6af2af1c7: Download complete
Step #1: 800687449569: Pull complete
Step #1: 67cc84ed39bf: Pull complete
Step #1: 33c4464df317: Pull complete
Step #1: 7a3d59ffed63: Pull complete
Step #1: bc24bccd8f7c: Pull complete
Step #1: 18d20619fb8d: Pull complete
Step #1: 0ec212d79142: Pull complete
Step #1: 0d731e844f5b: Pull complete
Step #1: 03e6d4298870: Pull complete
Step #1: 9cb6c9480ffe: Pull complete
Step #1: 636367483a85: Pull complete
Step #1: ab160a08f40f: Pull complete
Step #1: d56fb1501120: Pull complete
Step #1: 6e5ee80d4b76: Pull complete
Step #1: 069b70ca1828: Pull complete
Step #1: 082a5c4ba783: Pull complete
Step #1: aeb889ce9374: Pull complete
Step #1: b3c77a307741: Pull complete
Step #1: 19afa95abd0d: Pull complete
Step #1: 3331bfca5447: Pull complete
Step #1: ca89507fe8d3: Pull complete
Step #1: 093d0a8d4813: Pull complete
Step #1: 562130e5e1f0: Pull complete
Step #1: c78d65770fdc: Pull complete
Step #1: d8a48a39f3bb: Pull complete
Step #1: d547270a8392: Pull complete
Step #1: cd72b15f7674: Pull complete
Step #1: fed123fa2f8a: Pull complete
Step #1: 39a8609a58c5: Pull complete
Step #1: d942b3144a95: Pull complete
Step #1: 30e6af2af1c7: Pull complete
Step #1: a9e61f79d57c: Pull complete
Step #1: Digest: sha256:641f59e60daf76531999fb869bce29997d9552e548e382710930b708cec43039
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest
Step #1:  ---> 17ba2eb8a017
Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/plgd-dev/go-coap.git
Step #1:  ---> Running in ba44aa82d2d3
Step #1: Cloning into 'go-coap'...
Step #1: Removing intermediate container ba44aa82d2d3
Step #1:  ---> 1d1d81de6db5
Step #1: Step 3/5 : RUN go install github.com/AdamKorcz/go-118-fuzz-build@latest
Step #1:  ---> Running in 5d73e0e791ad
Step #1: go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2
Step #1: Removing intermediate container 5d73e0e791ad
Step #1:  ---> 2642d527ff23
Step #1: Step 4/5 : COPY build.sh $SRC/
Step #1:  ---> 29ea373a1fcf
Step #1: Step 5/5 : WORKDIR $SRC/go-coap
Step #1:  ---> Running in fa3dcd61c735
Step #1: Removing intermediate container fa3dcd61c735
Step #1:  ---> d3de57d5c386
Step #1: Successfully built d3de57d5c386
Step #1: Successfully tagged gcr.io/oss-fuzz/go-coap:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-coap
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/filefScEZM
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ go == \g\o ]]
Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go'
Step #2 - "srcmap": ++ find /src /root/go -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/go-coap/.git
Step #2 - "srcmap": + GIT_DIR=/src/go-coap
Step #2 - "srcmap": + cd /src/go-coap
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/plgd-dev/go-coap.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=42d43eb6b673e460df786cb20b13f0e62bc5e69d
Step #2 - "srcmap": + jq_inplace /tmp/filefScEZM '."/src/go-coap" = { type: "git", url: "https://github.com/plgd-dev/go-coap.git", rev: "42d43eb6b673e460df786cb20b13f0e62bc5e69d" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileBhui59
Step #2 - "srcmap": + cat /tmp/filefScEZM
Step #2 - "srcmap": + jq '."/src/go-coap" = { type: "git", url: "https://github.com/plgd-dev/go-coap.git", rev: "42d43eb6b673e460df786cb20b13f0e62bc5e69d" }'
Step #2 - "srcmap": + mv /tmp/fileBhui59 /tmp/filefScEZM
Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d
Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/filefScEZM
Step #2 - "srcmap": + rm /tmp/filefScEZM
Step #2 - "srcmap": {
Step #2 - "srcmap":   "/src/go-coap": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/plgd-dev/go-coap.git",
Step #2 - "srcmap":     "rev": "42d43eb6b673e460df786cb20b13f0e62bc5e69d"
Step #2 - "srcmap":   }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/AdamKorcz/go-118-fuzz-build/testing
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24
Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24
Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/go-coap/udp/coder FuzzDecode fuzz_decode_udp
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.8.4
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1
Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/go-coap/tcp/coder FuzzDecode fuzz_decode_tcp
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/go-coap/message FuzzUnmarshalData fuzz_unmarshal_data
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ pwd
Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/go-coap/message/codes FuzzUnmarshalJSON fuzz_unmarshal_json
Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists
Finished Step #3 - "compile-libfuzzer-coverage-x86_64"
Starting Step #4
Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner
Step #4: Using default tag: latest
Step #4: latest: Pulling from oss-fuzz-base/base-runner
Step #4: b549f31133a9: Already exists
Step #4: 800687449569: Already exists
Step #4: 67cc84ed39bf: Already exists
Step #4: 4f9c5aaef41d: Pulling fs layer
Step #4: 70a3154e11f3: Pulling fs layer
Step #4: 4fab6a53b47e: Pulling fs layer
Step #4: 2c8974b97e3f: Pulling fs layer
Step #4: fa34d2d81dbe: Pulling fs layer
Step #4: 25703bb604aa: Pulling fs layer
Step #4: c73cf34df98f: Pulling fs layer
Step #4: 52a1fd76d509: Pulling fs layer
Step #4: 6887dca9f6f7: Pulling fs layer
Step #4: 9d450e2f2926: Pulling fs layer
Step #4: caeaffc0bf5a: Pulling fs layer
Step #4: 5bddf29a1eb5: Pulling fs layer
Step #4: 5123d679bab9: Pulling fs layer
Step #4: cd3fe814a4bf: Pulling fs layer
Step #4: c73cf34df98f: Waiting
Step #4: 52a1fd76d509: Waiting
Step #4: 6887dca9f6f7: Waiting
Step #4: 9d450e2f2926: Waiting
Step #4: caeaffc0bf5a: Waiting
Step #4: 5bddf29a1eb5: Waiting
Step #4: 2c8974b97e3f: Waiting
Step #4: fa34d2d81dbe: Waiting
Step #4: 25703bb604aa: Waiting
Step #4: 5123d679bab9: Waiting
Step #4: cd3fe814a4bf: Waiting
Step #4: 4fab6a53b47e: Verifying Checksum
Step #4: 4fab6a53b47e: Download complete
Step #4: 70a3154e11f3: Verifying Checksum
Step #4: 70a3154e11f3: Download complete
Step #4: 4f9c5aaef41d: Verifying Checksum
Step #4: 4f9c5aaef41d: Download complete
Step #4: 25703bb604aa: Verifying Checksum
Step #4: 25703bb604aa: Download complete
Step #4: c73cf34df98f: Verifying Checksum
Step #4: c73cf34df98f: Download complete
Step #4: 4f9c5aaef41d: Pull complete
Step #4: 6887dca9f6f7: Verifying Checksum
Step #4: 6887dca9f6f7: Download complete
Step #4: 52a1fd76d509: Verifying Checksum
Step #4: 52a1fd76d509: Download complete
Step #4: 70a3154e11f3: Pull complete
Step #4: caeaffc0bf5a: Verifying Checksum
Step #4: caeaffc0bf5a: Download complete
Step #4: 4fab6a53b47e: Pull complete
Step #4: 2c8974b97e3f: Verifying Checksum
Step #4: 2c8974b97e3f: Download complete
Step #4: 5bddf29a1eb5: Verifying Checksum
Step #4: 5bddf29a1eb5: Download complete
Step #4: cd3fe814a4bf: Verifying Checksum
Step #4: cd3fe814a4bf: Download complete
Step #4: 9d450e2f2926: Verifying Checksum
Step #4: 9d450e2f2926: Download complete
Step #4: 5123d679bab9: Verifying Checksum
Step #4: 5123d679bab9: Download complete
Step #4: 2c8974b97e3f: Pull complete
Step #4: fa34d2d81dbe: Pull complete
Step #4: 25703bb604aa: Pull complete
Step #4: c73cf34df98f: Pull complete
Step #4: 52a1fd76d509: Pull complete
Step #4: 6887dca9f6f7: Pull complete
Step #4: 9d450e2f2926: Pull complete
Step #4: caeaffc0bf5a: Pull complete
Step #4: 5bddf29a1eb5: Pull complete
Step #4: 5123d679bab9: Pull complete
Step #4: cd3fe814a4bf: Pull complete
Step #4: Digest: sha256:f6046c5172da95c6c285c79de830b29f4115d542fe22b864a5dbc1432da29528
Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
Step #4: gcr.io/oss-fuzz-base/base-runner:latest
Finished Step #4
Starting Step #5
Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Step #5: Running go target fuzz_decode_udp
Step #5: Running go target fuzz_unmarshal_json
Step #5: Running go target fuzz_unmarshal_data
Step #5: Running go target fuzz_decode_tcp
Step #5: /workspace/out/libfuzzer-coverage-x86_64
Step #5: /workspace/out/libfuzzer-coverage-x86_64
Step #5: /workspace/out/libfuzzer-coverage-x86_64
Step #5: /workspace/out/libfuzzer-coverage-x86_64
Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps
Step #5: 2023/12/01 06:06:35 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory
Step #5: mv: cannot stat 'merged.data': No such file or directory
Step #5: 2023/12/01 06:06:35 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory
Step #5: mv: cannot stat 'merged.data': No such file or directory
Step #5: Finished generating code coverage report for Go fuzz targets.
Finished Step #5
Starting Step #6
Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #6: CommandException: 1 files/objects could not be removed.
Finished Step #6
Starting Step #7
Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]...
Step #7: / [0/3 files][    0.0 B/174.1 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]...
Step #7: / [0/3 files][    0.0 B/174.1 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]...
Step #7: / [0/3 files][ 84.2 KiB/174.1 KiB]  48% Done                                    
/ [1/3 files][174.1 KiB/174.1 KiB]  99% Done                                    
/ [2/3 files][174.1 KiB/174.1 KiB]  99% Done                                    
/ [3/3 files][174.1 KiB/174.1 KiB] 100% Done                                    
Step #7: Operation completed over 3 objects/174.1 KiB.                                    
Finished Step #7
Starting Step #8
Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #8: CommandException: 1 files/objects could not be removed.
Finished Step #8
Starting Step #9
Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_decode_udp.json [Content-Type=application/json]...
Step #9: / [0/5 files][    0.0 B/  7.1 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_unmarshal_data.json [Content-Type=application/json]...
Step #9: / [0/5 files][    0.0 B/  7.1 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_decode_tcp.json [Content-Type=application/json]...
Step #9: / [0/5 files][    0.0 B/  7.1 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_unmarshal_json.json [Content-Type=application/json]...
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]...
Step #9: / [0/5 files][  898.0 B/  7.1 KiB]  12% Done                                    
/ [0/5 files][  898.0 B/  7.1 KiB]  12% Done                                    
/ [1/5 files][  7.1 KiB/  7.1 KiB]  99% Done                                    
/ [2/5 files][  7.1 KiB/  7.1 KiB]  99% Done                                    
/ [3/5 files][  7.1 KiB/  7.1 KiB]  99% Done                                    
/ [4/5 files][  7.1 KiB/  7.1 KiB]  99% Done                                    
/ [5/5 files][  7.1 KiB/  7.1 KiB] 100% Done                                    
Step #9: Operation completed over 5 objects/7.1 KiB.                                      
Finished Step #9
Starting Step #10
Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #10: CommandException: 1 files/objects could not be removed.
Finished Step #10
Starting Step #11
Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #11: 
Step #11:                    ***** NOTICE *****
Step #11: 
Step #11: Official `cloud-sdk` images, including multiple tagged versions across multiple
Step #11: platforms, can be found at
Step #11: https://github.com/GoogleCloudPlatform/cloud-sdk-docker.
Step #11: 
Step #11: Suggested alternative images include:
Step #11: 
Step #11:     gcr.io/google.com/cloudsdktool/cloud-sdk
Step #11:     gcr.io/google.com/cloudsdktool/cloud-sdk:alpine
Step #11:     gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based
Step #11:     gcr.io/google.com/cloudsdktool/cloud-sdk:slim
Step #11: 
Step #11: Please note that the `gsutil` entrypoint must be specified when using these
Step #11: images.
Step #11: 
Step #11:                 ***** END OF NOTICE *****
Step #11: 
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_decode_tcp.log [Content-Type=application/octet-stream]...
Step #11: / [0/4 files][    0.0 B/  140.0 B]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_unmarshal_json.log [Content-Type=application/octet-stream]...
Step #11: / [0/4 files][    0.0 B/  140.0 B]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_unmarshal_data.log [Content-Type=application/octet-stream]...
Step #11: / [0/4 files][    0.0 B/  140.0 B]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_decode_udp.log [Content-Type=application/octet-stream]...
Step #11: / [0/4 files][    0.0 B/  140.0 B]   0% Done                                    
/ [1/4 files][  140.0 B/  140.0 B]  99% Done                                    
/ [2/4 files][  140.0 B/  140.0 B]  99% Done                                    
/ [3/4 files][  140.0 B/  140.0 B]  99% Done                                    
/ [4/4 files][  140.0 B/  140.0 B] 100% Done                                    
Step #11: Operation completed over 4 objects/140.0 B.                                      
Finished Step #11
Starting Step #12
Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]...
Step #12: / [0 files][    0.0 B/  155.0 B]                                                
/ [1 files][  155.0 B/  155.0 B]                                                
Step #12: Operation completed over 1 objects/155.0 B.                                      
Finished Step #12
Starting Step #13
Step #13: Already have image (with digest): gcr.io/cloud-builders/curl
Step #13:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #13:                                  Dload  Upload   Total   Spent    Left  Speed
Step #13: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   309    0     0  100   309      0   1437 --:--:-- --:--:-- --:--:--  1443
Finished Step #13
PUSH
DONE