starting build "bcb1bb14-c787-4ae5-9bbf-95618d123036" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 22.02kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: eaead16dc43b: Pulling fs layer Step #1: 424369f133ec: Pulling fs layer Step #1: 59a81f0d36d6: Pulling fs layer Step #1: f56f024f5b63: Pulling fs layer Step #1: 77fdd1fdbf82: Pulling fs layer Step #1: eefe634267c7: Pulling fs layer Step #1: 15490c571461: Pulling fs layer Step #1: 8ebd363002a3: Pulling fs layer Step #1: bc05a74e2fc0: Pulling fs layer Step #1: 31ea51d6affa: Pulling fs layer Step #1: 7fc00d33211f: Pulling fs layer Step #1: 0034a828b90e: Pulling fs layer Step #1: e0f6a071ff31: Pulling fs layer Step #1: b432f5257512: Pulling fs layer Step #1: 6b46ab2793ec: Pulling fs layer Step #1: 531a44b04d57: Pulling fs layer Step #1: ec7553b44a3f: Pulling fs layer Step #1: 8ee92b68c75f: Pulling fs layer Step #1: 9e3b1ef44533: Pulling fs layer Step #1: f2a0976cf964: Pulling fs layer Step #1: f253e62abc98: Pulling fs layer Step #1: ae6656ed6dfb: Pulling fs layer Step #1: 23d4e326597f: Pulling fs layer Step #1: 584b7ea503d7: Pulling fs layer Step #1: ab22fe06d7d9: Pulling fs layer Step #1: 1aff37082ff9: Pulling fs layer Step #1: 1847164650a9: Pulling fs layer Step #1: 42e123215a30: Pulling fs layer Step #1: 7fc00d33211f: Waiting Step #1: 0034a828b90e: Waiting Step #1: e0f6a071ff31: Waiting Step #1: b432f5257512: Waiting Step #1: 6b46ab2793ec: Waiting Step #1: 531a44b04d57: Waiting Step #1: ec7553b44a3f: Waiting Step #1: 8ee92b68c75f: Waiting Step #1: 15490c571461: Waiting Step #1: 9e3b1ef44533: Waiting Step #1: 8ebd363002a3: Waiting Step #1: f2a0976cf964: Waiting Step #1: bc05a74e2fc0: Waiting Step #1: f253e62abc98: Waiting Step #1: 31ea51d6affa: Waiting Step #1: ae6656ed6dfb: Waiting Step #1: 23d4e326597f: Waiting Step #1: 42e123215a30: Waiting Step #1: 584b7ea503d7: Waiting Step #1: 1847164650a9: Waiting Step #1: ab22fe06d7d9: Waiting Step #1: f56f024f5b63: Waiting Step #1: 59a81f0d36d6: Download complete Step #1: eaead16dc43b: Verifying Checksum Step #1: eaead16dc43b: Download complete Step #1: f56f024f5b63: Verifying Checksum Step #1: f56f024f5b63: Download complete Step #1: 77fdd1fdbf82: Verifying Checksum Step #1: 77fdd1fdbf82: Download complete Step #1: eefe634267c7: Verifying Checksum Step #1: eefe634267c7: Download complete Step #1: 8ebd363002a3: Download complete Step #1: bc05a74e2fc0: Download complete Step #1: 424369f133ec: Verifying Checksum Step #1: 424369f133ec: Download complete Step #1: 7fc00d33211f: Verifying Checksum Step #1: 7fc00d33211f: Download complete Step #1: 0034a828b90e: Verifying Checksum Step #1: 0034a828b90e: Download complete Step #1: e0f6a071ff31: Verifying Checksum Step #1: e0f6a071ff31: Download complete Step #1: b432f5257512: Download complete Step #1: 6b46ab2793ec: Verifying Checksum Step #1: 6b46ab2793ec: Download complete Step #1: 531a44b04d57: Download complete Step #1: ec7553b44a3f: Download complete Step #1: 8ee92b68c75f: Verifying Checksum Step #1: 8ee92b68c75f: Download complete Step #1: eaead16dc43b: Pull complete Step #1: 9e3b1ef44533: Verifying Checksum Step #1: 9e3b1ef44533: Download complete Step #1: f2a0976cf964: Verifying Checksum Step #1: f2a0976cf964: Download complete Step #1: f253e62abc98: Verifying Checksum Step #1: f253e62abc98: Download complete Step #1: ae6656ed6dfb: Verifying Checksum Step #1: ae6656ed6dfb: Download complete Step #1: 23d4e326597f: Download complete Step #1: 584b7ea503d7: Download complete Step #1: ab22fe06d7d9: Verifying Checksum Step #1: ab22fe06d7d9: Download complete Step #1: 1aff37082ff9: Download complete Step #1: 31ea51d6affa: Verifying Checksum Step #1: 31ea51d6affa: Download complete Step #1: 42e123215a30: Verifying Checksum Step #1: 42e123215a30: Download complete Step #1: 15490c571461: Verifying Checksum Step #1: 15490c571461: Download complete Step #1: 424369f133ec: Pull complete Step #1: 59a81f0d36d6: Pull complete Step #1: 1847164650a9: Verifying Checksum Step #1: 1847164650a9: Download complete Step #1: f56f024f5b63: Pull complete Step #1: 77fdd1fdbf82: Pull complete Step #1: eefe634267c7: Pull complete Step #1: 15490c571461: Pull complete Step #1: 8ebd363002a3: Pull complete Step #1: bc05a74e2fc0: Pull complete Step #1: 31ea51d6affa: Pull complete Step #1: 7fc00d33211f: Pull complete Step #1: 0034a828b90e: Pull complete Step #1: e0f6a071ff31: Pull complete Step #1: b432f5257512: Pull complete Step #1: 6b46ab2793ec: Pull complete Step #1: 531a44b04d57: Pull complete Step #1: ec7553b44a3f: Pull complete Step #1: 8ee92b68c75f: Pull complete Step #1: 9e3b1ef44533: Pull complete Step #1: f2a0976cf964: Pull complete Step #1: f253e62abc98: Pull complete Step #1: ae6656ed6dfb: Pull complete Step #1: 23d4e326597f: Pull complete Step #1: 584b7ea503d7: Pull complete Step #1: ab22fe06d7d9: Pull complete Step #1: 1aff37082ff9: Pull complete Step #1: 1847164650a9: Pull complete Step #1: 42e123215a30: Pull complete Step #1: Digest: sha256:9ca90f074e99135b7e3c494ac31e5f22012d4a0a3f7fc12f7a701cefdbdbaaa7 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> b684d5ff4cc8 Step #1: Step 2/6 : RUN git clone --depth 1 https://github.com/vitessio/vitess Step #1: ---> Running in bcba0f15076f Step #1: Cloning into 'vitess'... Step #1: Removing intermediate container bcba0f15076f Step #1: ---> d96409ce1890 Step #1: Step 3/6 : RUN go install golang.org/dl/gotip@latest && gotip download Step #1: ---> Running in 9807d1706eda Step #1: go: downloading golang.org/dl v0.0.0-20221101163307-8012bed62c3d Step #1: Cloning into '/root/sdk/gotip'... Step #1: Updating files: 54% (6456/11940) Updating files: 55% (6567/11940) Updating files: 56% (6687/11940) Updating files: 57% (6806/11940) Updating files: 58% (6926/11940) Updating files: 59% (7045/11940) Updating files: 60% (7164/11940) Updating files: 61% (7284/11940) Updating files: 62% (7403/11940) Updating files: 63% (7523/11940) Updating files: 64% (7642/11940) Updating files: 65% (7761/11940) Updating files: 66% (7881/11940) Updating files: 67% (8000/11940) Updating files: 68% (8120/11940) Updating files: 69% (8239/11940) Updating files: 70% (8358/11940) Updating files: 71% (8478/11940) Updating files: 72% (8597/11940) Updating files: 73% (8717/11940) Updating files: 74% (8836/11940) Updating files: 75% (8955/11940) Updating files: 76% (9075/11940) Updating files: 77% (9194/11940) Updating files: 78% (9314/11940) Updating files: 79% (9433/11940) Updating files: 80% (9552/11940) Updating files: 81% (9672/11940) Updating files: 82% (9791/11940) Updating files: 83% (9911/11940) Updating files: 84% (10030/11940) Updating files: 85% (10149/11940) Updating files: 86% (10269/11940) Updating files: 87% (10388/11940) Updating files: 88% (10508/11940) Updating files: 89% (10627/11940) Updating files: 90% (10746/11940) Updating files: 91% (10866/11940) Updating files: 92% (10985/11940) Updating files: 93% (11105/11940) Updating files: 94% (11224/11940) Updating files: 95% (11343/11940) Updating files: 96% (11463/11940) Updating files: 97% (11582/11940) Updating files: 98% (11702/11940) Updating files: 99% (11821/11940) Updating files: 100% (11940/11940) Updating files: 100% (11940/11940), done. Step #1: Updating the go development tree... Step #1: From https://go.googlesource.com/go Step #1: * branch master -> FETCH_HEAD Step #1: HEAD is now at c55d184 spec: document the new unsafe functions SliceData, String, and StringData Step #1: Building Go cmd/dist using /root/.go. (go1.19 linux/amd64) Step #1: Building Go toolchain1 using /root/.go. Step #1: Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1. Step #1: Building Go toolchain2 using go_bootstrap and Go toolchain1. Step #1: Building Go toolchain3 using go_bootstrap and Go toolchain2. Step #1: Building packages and commands for linux/amd64. Step #1: --- Step #1: Installed Go for linux/amd64 in /root/sdk/gotip Step #1: Installed commands in /root/sdk/gotip/bin Step #1: Success. You may now run 'gotip'! Step #1: Removing intermediate container 9807d1706eda Step #1: ---> 7304459cd834 Step #1: Step 4/6 : RUN go install github.com/AdamKorcz/go-118-fuzz-build@latest Step #1: ---> Running in 4a876a09deb8 Step #1: go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20220912195655-e1f97a00006b Step #1: Removing intermediate container 4a876a09deb8 Step #1: ---> 47260e4afb66 Step #1: Step 5/6 : COPY build.sh native_ossfuzz_coverage_runnger.go fuzzers/tablet_manager_fuzzer_test.go fuzzers/parser_fuzzer_test.go fuzzers/ast_fuzzer_test.go $SRC/ Step #1: ---> 7e73c50e810a Step #1: Step 6/6 : WORKDIR $SRC/vitess Step #1: ---> Running in fa1dd5ae0f23 Step #1: Removing intermediate container fa1dd5ae0f23 Step #1: ---> 2af1aea0b091 Step #1: Successfully built 2af1aea0b091 Step #1: Successfully tagged gcr.io/oss-fuzz/testing-native-go-fuzzing:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/testing-native-go-fuzzing Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file27ly4N Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/vitess/.git Step #2 - "srcmap": + GIT_DIR=/src/vitess Step #2 - "srcmap": + cd /src/vitess Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/vitessio/vitess Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=90fe6f474b263b2b78199b77877cefb306010e57 Step #2 - "srcmap": + jq_inplace /tmp/file27ly4N '."/src/vitess" = { type: "git", url: "https://github.com/vitessio/vitess", rev: "90fe6f474b263b2b78199b77877cefb306010e57" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filevMp12a Step #2 - "srcmap": + cat /tmp/file27ly4N Step #2 - "srcmap": + jq '."/src/vitess" = { type: "git", url: "https://github.com/vitessio/vitess", rev: "90fe6f474b263b2b78199b77877cefb306010e57" }' Step #2 - "srcmap": + mv /tmp/filevMp12a /tmp/file27ly4N Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/centipede/.git Step #2 - "srcmap": + GIT_DIR=/src/centipede Step #2 - "srcmap": + cd /src/centipede Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/centipede.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=baa82e7189677bb9086beb5d9b5e58018d991607 Step #2 - "srcmap": + jq_inplace /tmp/file27ly4N '."/src/centipede" = { type: "git", url: "https://github.com/google/centipede.git", rev: "baa82e7189677bb9086beb5d9b5e58018d991607" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filefAo2qK Step #2 - "srcmap": + cat /tmp/file27ly4N Step #2 - "srcmap": + jq '."/src/centipede" = { type: "git", url: "https://github.com/google/centipede.git", rev: "baa82e7189677bb9086beb5d9b5e58018d991607" }' Step #2 - "srcmap": + mv /tmp/filefAo2qK /tmp/file27ly4N Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file27ly4N Step #2 - "srcmap": + rm /tmp/file27ly4N Step #2 - "srcmap": { Step #2 - "srcmap": "/src/vitess": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/vitessio/vitess", Step #2 - "srcmap": "rev": "90fe6f474b263b2b78199b77877cefb306010e57" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/centipede": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/centipede.git", Step #2 - "srcmap": "rev": "baa82e7189677bb9086beb5d9b5e58018d991607" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Zinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/AdamKorcz/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'go-118-fuzz-build'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 274, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 1% (1/84) remote: Counting objects: 2% (2/84) remote: Counting objects: 3% (3/84) remote: Counting objects: 4% (4/84) remote: Counting objects: 5% (5/84) remote: Counting objects: 7% (6/84) remote: Counting objects: 8% (7/84) remote: Counting objects: 9% (8/84) remote: Counting objects: 10% (9/84) remote: Counting objects: 11% (10/84) remote: Counting objects: 13% (11/84) remote: Counting objects: 14% (12/84) remote: Counting objects: 15% (13/84) remote: Counting objects: 16% (14/84) remote: Counting objects: 17% (15/84) remote: Counting objects: 19% (16/84) remote: Counting objects: 20% (17/84) remote: Counting objects: 21% (18/84) remote: Counting objects: 22% (19/84) remote: Counting objects: 23% (20/84) remote: Counting objects: 25% (21/84) remote: Counting objects: 26% (22/84) remote: Counting objects: 27% (23/84) remote: Counting objects: 28% (24/84) remote: Counting objects: 29% (25/84) remote: Counting objects: 30% (26/84) remote: Counting objects: 32% (27/84) remote: Counting objects: 33% (28/84) remote: Counting objects: 34% (29/84) remote: Counting objects: 35% (30/84) remote: Counting objects: 36% (31/84) remote: Counting objects: 38% (32/84) remote: Counting objects: 39% (33/84) remote: Counting objects: 40% (34/84) remote: Counting objects: 41% (35/84) remote: Counting objects: 42% (36/84) remote: Counting objects: 44% (37/84) remote: Counting objects: 45% (38/84) remote: Counting objects: 46% (39/84) remote: Counting objects: 47% (40/84) remote: Counting objects: 48% (41/84) remote: Counting objects: 50% (42/84) remote: Counting objects: 51% (43/84) remote: Counting objects: 52% (44/84) remote: Counting objects: 53% (45/84) remote: Counting objects: 54% (46/84) remote: Counting objects: 55% (47/84) remote: Counting objects: 57% (48/84) remote: Counting objects: 58% (49/84) remote: Counting objects: 59% (50/84) remote: Counting objects: 60% (51/84) remote: Counting objects: 61% (52/84) remote: Counting objects: 63% (53/84) remote: Counting objects: 64% (54/84) remote: Counting objects: 65% (55/84) remote: Counting objects: 66% (56/84) remote: Counting objects: 67% (57/84) remote: Counting objects: 69% (58/84) remote: Counting objects: 70% (59/84) remote: Counting objects: 71% (60/84) remote: Counting objects: 72% (61/84) remote: Counting objects: 73% (62/84) remote: Counting objects: 75% (63/84) remote: Counting objects: 76% (64/84) remote: Counting objects: 77% (65/84) remote: Counting objects: 78% (66/84) remote: Counting objects: 79% (67/84) remote: Counting objects: 80% (68/84) remote: Counting objects: 82% (69/84) remote: Counting objects: 83% (70/84) remote: Counting objects: 84% (71/84) remote: Counting objects: 85% (72/84) remote: Counting objects: 86% (73/84) remote: Counting objects: 88% (74/84) remote: Counting objects: 89% (75/84) remote: Counting objects: 90% (76/84) remote: Counting objects: 91% (77/84) remote: Counting objects: 92% (78/84) remote: Counting objects: 94% (79/84) remote: Counting objects: 95% (80/84) remote: Counting objects: 96% (81/84) remote: Counting objects: 97% (82/84) remote: Counting objects: 98% (83/84) remote: Counting objects: 100% (84/84) remote: Counting objects: 100% (84/84), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 2% (1/50) remote: Compressing objects: 4% (2/50) remote: Compressing objects: 6% (3/50) remote: Compressing objects: 8% (4/50) remote: Compressing objects: 10% (5/50) remote: Compressing objects: 12% (6/50) remote: Compressing objects: 14% (7/50) remote: Compressing objects: 16% (8/50) remote: Compressing objects: 18% (9/50) remote: Compressing objects: 20% (10/50) remote: Compressing objects: 22% (11/50) remote: Compressing objects: 24% (12/50) remote: Compressing objects: 26% (13/50) remote: Compressing objects: 28% (14/50) remote: Compressing objects: 30% (15/50) remote: Compressing objects: 32% (16/50) remote: Compressing objects: 34% (17/50) remote: Compressing objects: 36% (18/50) remote: Compressing objects: 38% (19/50) remote: Compressing objects: 40% (20/50) remote: Compressing objects: 42% (21/50) remote: Compressing objects: 44% (22/50) remote: Compressing objects: 46% (23/50) remote: Compressing objects: 48% (24/50) remote: Compressing objects: 50% (25/50) remote: Compressing objects: 52% (26/50) remote: Compressing objects: 54% (27/50) remote: Compressing objects: 56% (28/50) remote: Compressing objects: 58% (29/50) remote: Compressing objects: 60% (30/50) remote: Compressing objects: 62% (31/50) remote: Compressing objects: 64% (32/50) remote: Compressing objects: 66% (33/50) remote: Compressing objects: 68% (34/50) remote: Compressing objects: 70% (35/50) remote: Compressing objects: 72% (36/50) remote: Compressing objects: 74% (37/50) remote: Compressing objects: 76% (38/50) remote: Compressing objects: 78% (39/50) remote: Compressing objects: 80% (40/50) remote: Compressing objects: 82% (41/50) remote: Compressing objects: 84% (42/50) remote: Compressing objects: 86% (43/50) remote: Compressing objects: 88% (44/50) remote: Compressing objects: 90% (45/50) remote: Compressing objects: 92% (46/50) remote: Compressing objects: 94% (47/50) remote: Compressing objects: 96% (48/50) remote: Compressing objects: 98% (49/50) remote: Compressing objects: 100% (50/50) remote: Compressing objects: 100% (50/50), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/274) Receiving objects: 1% (3/274) Receiving objects: 2% (6/274) Receiving objects: 3% (9/274) Receiving objects: 4% (11/274) Receiving objects: 5% (14/274) Receiving objects: 6% (17/274) Receiving objects: 7% (20/274) Receiving objects: 8% (22/274) Receiving objects: 9% (25/274) Receiving objects: 10% (28/274) Receiving objects: 11% (31/274) Receiving objects: 12% (33/274) Receiving objects: 13% (36/274) Receiving objects: 14% (39/274) Receiving objects: 15% (42/274) Receiving objects: 16% (44/274) Receiving objects: 17% (47/274) Receiving objects: 18% (50/274) Receiving objects: 19% (53/274) Receiving objects: 20% (55/274) Receiving objects: 21% (58/274) Receiving objects: 22% (61/274) Receiving objects: 23% (64/274) Receiving objects: 24% (66/274) Receiving objects: 25% (69/274) Receiving objects: 26% (72/274) Receiving objects: 27% (74/274) Receiving objects: 28% (77/274) Receiving objects: 29% (80/274) Receiving objects: 30% (83/274) Receiving objects: 31% (85/274) Receiving objects: 32% (88/274) Receiving objects: 33% (91/274) Receiving objects: 34% (94/274) Receiving objects: 35% (96/274) Receiving objects: 36% (99/274) Receiving objects: 37% (102/274) Receiving objects: 38% (105/274) Receiving objects: 39% (107/274) Receiving objects: 40% (110/274) Receiving objects: 41% (113/274) Receiving objects: 42% (116/274) Receiving objects: 43% (118/274) Receiving objects: 44% (121/274) Receiving objects: 45% (124/274) Receiving objects: 46% (127/274) Receiving objects: 47% (129/274) Receiving objects: 48% (132/274) Receiving objects: 49% (135/274) Receiving objects: 50% (137/274) Receiving objects: 51% (140/274) Receiving objects: 52% (143/274) Receiving objects: 53% (146/274) Receiving objects: 54% (148/274) Receiving objects: 55% (151/274) Receiving objects: 56% (154/274) Receiving objects: 57% (157/274) Receiving objects: 58% (159/274) Receiving objects: 59% (162/274) Receiving objects: 60% (165/274) Receiving objects: 61% (168/274) Receiving objects: 62% (170/274) Receiving objects: 63% (173/274) Receiving objects: 64% (176/274) Receiving objects: 65% (179/274) Receiving objects: 66% (181/274) Receiving objects: 67% (184/274) Receiving objects: 68% (187/274) Receiving objects: 69% (190/274) Receiving objects: 70% (192/274) Receiving objects: 71% (195/274) Receiving objects: 72% (198/274) Receiving objects: 73% (201/274) Receiving objects: 74% (203/274) Receiving objects: 75% (206/274) remote: Total 274 (delta 49), reused 62 (delta 34), pack-reused 190 Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 76% (209/274) Receiving objects: 77% (211/274) Receiving objects: 78% (214/274) Receiving objects: 79% (217/274) Receiving objects: 80% (220/274) Receiving objects: 81% (222/274) Receiving objects: 82% (225/274) Receiving objects: 83% (228/274) Receiving objects: 84% (231/274) Receiving objects: 85% (233/274) Receiving objects: 86% (236/274) Receiving objects: 87% (239/274) Receiving objects: 88% (242/274) Receiving objects: 89% (244/274) Receiving objects: 90% (247/274) Receiving objects: 91% (250/274) Receiving objects: 92% (253/274) Receiving objects: 93% (255/274) Receiving objects: 94% (258/274) Receiving objects: 95% (261/274) Receiving objects: 96% (264/274) Receiving objects: 97% (266/274) Receiving objects: 98% (269/274) Receiving objects: 99% (272/274) Receiving objects: 100% (274/274) Receiving objects: 100% (274/274), 110.48 KiB | 2.35 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/135) Resolving deltas: 2% (3/135) Resolving deltas: 14% (20/135) Resolving deltas: 18% (25/135) Resolving deltas: 21% (29/135) Resolving deltas: 22% (30/135) Resolving deltas: 36% (49/135) Resolving deltas: 37% (50/135) Resolving deltas: 42% (58/135) Resolving deltas: 43% (59/135) Resolving deltas: 44% (60/135) Resolving deltas: 46% (63/135) Resolving deltas: 50% (68/135) Resolving deltas: 54% (73/135) Resolving deltas: 57% (77/135) Resolving deltas: 58% (79/135) Resolving deltas: 59% (80/135) Resolving deltas: 80% (109/135) Resolving deltas: 82% (111/135) Resolving deltas: 83% (113/135) Resolving deltas: 84% (114/135) Resolving deltas: 85% (116/135) Resolving deltas: 88% (120/135) Resolving deltas: 89% (121/135) Resolving deltas: 92% (125/135) Resolving deltas: 94% (128/135) Resolving deltas: 96% (130/135) Resolving deltas: 100% (135/135) Resolving deltas: 100% (135/135), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd addimport Step #3 - "compile-libfuzzer-coverage-x86_64": + go build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/vitess Step #3 - "compile-libfuzzer-coverage-x86_64": + rm go/vt/vtgate/vindexes/fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cp go/test/fuzzing/vtctl_fuzzer.go /tmp/ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r go/test/fuzzing/ast_fuzzer.go go/test/fuzzing/autogenerate go/test/fuzzing/fuzzdata go/test/fuzzing/oss_fuzz_build.sh go/test/fuzzing/parser_fuzzer.go go/test/fuzzing/tablet_manager_fuzzer.go go/test/fuzzing/tabletserver_rules_fuzzer.go go/test/fuzzing/tabletserver_schema_fuzzer.go go/test/fuzzing/vt_schema_fuzzer.go go/test/fuzzing/vtctl_fuzzer.dict go/test/fuzzing/vtctl_fuzzer.go go/test/fuzzing/vtctl_fuzzer_test.go go/test/fuzzing/vttablet_fuzzer.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/parser_fuzzer_test.go /src/vitess/go/test/fuzzing/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/ast_fuzzer_test.go /src/vitess/go/test/fuzzing/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/tablet_manager_fuzzer_test.go /src/vitess/go/test/fuzzing/ Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/log.Errorf/c\\/\/log.Errorf' /src/vitess/go/mysql/conn.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/log.Warningf/c\\/\/log.Warningf' /src/vitess/go/vt/sqlparser/parser.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/vt/vttablet/tabletmanager/vreplication/framework_test.go ./go/vt/vttablet/tabletmanager/vreplication/framework_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/vt/vtgate/vindexes/consistent_lookup_test.go ./go/vt/vtgate/vindexes/consistent_lookup_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/vt/vtgate/engine/fake_vcursor_test.go ./go/vt/vtgate/engine/fake_vcursor.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/vt/vtgate/planbuilder/plan_test.go ./go/vt/vtgate/planbuilder/plan_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/vt/vttablet/tabletserver/testutils_test.go ./go/vt/vttablet/tabletserver/testutils_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv ./go/mysql/collations/uca_test.go ./go/mysql/collations/uca_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/vitess/go/vt/vtgate/grpcvtgateconn/suite_test.go /src/vitess/go/vt/vtgate/grpcvtgateconn/suite_test_fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/vitess/go/vt/vtgate/grpcvtgateconn/fuzz_flaky_test.go /src/vitess/go/vt/vtgate/grpcvtgateconn/fuzz.go Step #3 - "compile-libfuzzer-coverage-x86_64": + build_go_fuzzer vitess.io/vitess/go/test/fuzzing FuzzTabletManager_ExecuteFetchAsDba fuzz_tablet_manager_execute_fetch_as_dba Step #3 - "compile-libfuzzer-coverage-x86_64": + path=vitess.io/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTabletManager_ExecuteFetchAsDba Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_tablet_manager_execute_fetch_as_dba Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags gofuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list -tags gofuzz -f '{{.Dir}}' vitess.io/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + abs_file_dir=/src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r -l -s FuzzTabletManager_ExecuteFetchAsDba /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_filename=/src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r 'func FuzzTabletManager_ExecuteFetchAsDba' /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep testing.F Step #3 - "compile-libfuzzer-coverage-x86_64": ++ wc -l Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' 1 -eq 1 ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + gotip get github.com/AdamKorcz/go-118-fuzz-build/utils Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20220824214621-3c06a36a6952 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdaLogics/go-fuzz-headers v0.0.0-20211102141018-f7be0cbad29c => v0.0.0-20220824214621-3c06a36a6952 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20220912195655-e1f97a00006b Step #3 - "compile-libfuzzer-coverage-x86_64": + gotip get google.golang.org/grpc/internal/channelz@v1.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20220722155257-8c9f86f7a55f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: module github.com/golang/protobuf is deprecated: Use the "google.golang.org/protobuf" module instead. Step #3 - "compile-libfuzzer-coverage-x86_64": go: downgraded google.golang.org/grpc v1.45.0 => v1.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Native harness' Step #3 - "compile-libfuzzer-coverage-x86_64": Native harness Step #3 - "compile-libfuzzer-coverage-x86_64": + rewrite_go_fuzz_harness /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_filename=/src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go_fuzz_.go Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go /tmp/ Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'replacing *testing.F' Step #3 - "compile-libfuzzer-coverage-x86_64": replacing *testing.F Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/f \*testing\.F/f \*go118fuzzbuildutils\.F/g' /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go_fuzz_.go Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/go-118-fuzz-build/addimport/addimport -path /src/vitess/go/test/fuzzing/tablet_manager_fuzzer_test.go_fuzz_.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer fuzz_tablet_manager_execute_fetch_as_dba FuzzTabletManager_ExecuteFetchAsDba /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer=fuzz_tablet_manager_execute_fetch_as_dba Step #3 - "compile-libfuzzer-coverage-x86_64": + function=FuzzTabletManager_ExecuteFetchAsDba Step #3 - "compile-libfuzzer-coverage-x86_64": + path=/src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + tags='-tags gofuzz' Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ coverage = *coverage* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'here we perform coverage build' Step #3 - "compile-libfuzzer-coverage-x86_64": here we perform coverage build Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list -tags gofuzz -f '{{.Name}}' /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aquarapid/vaultlib v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.20.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spyzhov/ajson v0.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20221023144134-a1e5550cf13e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pires/go-proxyproto v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/pgzip v1.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pierrec/lz4 v2.6.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/planetscale/pargzip v0.0.0-20201116224723-90c7fc03ea8a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing-contrib/go-grpc v0.0.0-20180928155321-4b5a12d3ff02 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opentracing/opentracing-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/uber/jaeger-client-go v2.16.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/DataDog/dd-trace-go.v1 v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20220722155237-a158d28d115b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia v2.2.6+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-cleanhttp v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/patrickmn/go-cache v2.1.0+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yudai/golcs v0.0.0-20170316035057-ecda9a501e82 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20210701191553-46259e63a0a9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.0.0-20210723032227-1f47c861a9ac Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/api/v3 v3.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/pkg/v3 v3.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v3 v3.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/z-division/go-zookeeper v0.0.0-20190128072838-6d7457066b9b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/consul/api v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/uber/jaeger-lib v2.4.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-semver v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/mapstructure v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/serf v0.9.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-hclog v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-rootcerts v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tinylib/msgp v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-isatty v0.0.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fatih/color v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.2-0.20181231171920-c182affec369 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mattn/go-colorable v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/philhofer/fwd v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/atomic v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-metrics v0.0.0-20190430140413-ec5e00d3c878 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-immutable-radix v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_package=fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list -tags gofuzz -f '{{.Dir}}' /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + abspath=/src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/native_ossfuzz_coverage_runnger.go ./fuzztabletmanager_executefetchasdba_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/FuzzFunction/FuzzTabletManager_ExecuteFetchAsDba/ ./fuzztabletmanager_executefetchasdba_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/mypackagebeingfuzzed/fuzzing/ ./fuzztabletmanager_executefetchasdba_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i -e s/TestFuzzCorpus/TestFuzzTabletManager_ExecuteFetchAsDbaCorpus/ ./fuzztabletmanager_executefetchasdba_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list -tags gofuzz -f '{{.Module}}' /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzed_repo=vitess.io/vitess Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list -m -tags gofuzz -f '{{.Dir}}' vitess.io/vitess Step #3 - "compile-libfuzzer-coverage-x86_64": + abspath_repo=/src/vitess Step #3 - "compile-libfuzzer-coverage-x86_64": + echo s=vitess.io/vitess=/src/vitess= Step #3 - "compile-libfuzzer-coverage-x86_64": + ls Step #3 - "compile-libfuzzer-coverage-x86_64": ast_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": fuzztabletmanager_executefetchasdba_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": parser_fuzzer_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": tablet_manager_fuzzer_test.go_fuzz_.go Step #3 - "compile-libfuzzer-coverage-x86_64": + gotip test -run TestFuzzTabletManager_ExecuteFetchAsDbaCorpus -v -tags gofuzz -coverpkg vitess.io/vitess/... -c -o /workspace/out/libfuzzer-coverage-x86_64/fuzz_tablet_manager_execute_fetch_as_dba /src/vitess/go/test/fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": go build vitess.io/vitess/go/mysql: # vitess.io/vitess/go/mysql Step #3 - "compile-libfuzzer-coverage-x86_64": ../../mysql/mysql_fuzzer.go:105:17: cannot use (*fuzztestRun)(nil) (value of type *fuzztestRun) as Handler value in variable declaration: *fuzztestRun does not implement Handler (missing method ComBinlogDumpGTID) Step #3 - "compile-libfuzzer-coverage-x86_64": ../../mysql/mysql_fuzzer.go:203:30: cannot use handler (variable of type *fuzztestRun) as Handler value in argument to sConn.handleNextCommand: *fuzztestRun does not implement Handler (missing method ComBinlogDumpGTID) Step #3 - "compile-libfuzzer-coverage-x86_64": ../../mysql/mysql_fuzzer.go:219:30: cannot use handler (variable of type *fuzztestRun) as Handler value in argument to sConn.handleNextCommand: *fuzztestRun does not implement Handler (missing method ComBinlogDumpGTID) Step #3 - "compile-libfuzzer-coverage-x86_64": ../../mysql/mysql_fuzzer.go:330:67: not enough arguments in call to NewListener Step #3 - "compile-libfuzzer-coverage-x86_64": have (string, string, *AuthServerStatic, *fuzzTestHandler, number, number, bool) Step #3 - "compile-libfuzzer-coverage-x86_64": want (string, string, AuthServer, Handler, time.Duration, time.Duration, bool, bool) Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image testing-native-go-fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 testing-native-go-fuzzing Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1