starting build "c0c46f89-5d52-4c80-b62d-59f8a9d71d33" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Step #0: ***** NOTICE ***** Step #0: Step #0: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #0: platforms, can be found at Step #0: https://github.com/GoogleCloudPlatform/cloud-sdk-docker and may be more suitable Step #0: for some use cases when interacting with Cloud Source Repositories. Step #0: Step #0: For additional information, please visit Step #0: https://github.com/GoogleCloudPlatform/cloud-builders/tree/master/git Step #0: Step #0: ***** END OF NOTICE ***** Step #0: Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 10.75kB Step #1: Step 1/9 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: f39d80ca7021: Pulling fs layer Step #1: 3f7b104caa94: Pulling fs layer Step #1: 98d63d9f6c98: Pulling fs layer Step #1: 18e56a74fe3b: Pulling fs layer Step #1: d374a6bee675: Pulling fs layer Step #1: ec334fd6e8fa: Pulling fs layer Step #1: e3e240b0cd50: Pulling fs layer Step #1: b2512e0eab51: Pulling fs layer Step #1: 4223d1ba77d3: Pulling fs layer Step #1: 8d45a907f5ae: Pulling fs layer Step #1: 44ae4f1bee4d: Pulling fs layer Step #1: 5e1d39d83edd: Pulling fs layer Step #1: 96c98dcd7e17: Pulling fs layer Step #1: 98d63d9f6c98: Waiting Step #1: 136e28fc29c9: Pulling fs layer Step #1: af65c42a8b64: Pulling fs layer Step #1: a144ab822a62: Pulling fs layer Step #1: 18e56a74fe3b: Waiting Step #1: bcbe3735701b: Pulling fs layer Step #1: efddb1001a19: Pulling fs layer Step #1: d374a6bee675: Waiting Step #1: f2e49f1ff49e: Pulling fs layer Step #1: 2f0cc467e898: Pulling fs layer Step #1: b1b7efa61c06: Pulling fs layer Step #1: 64c91e3d268f: Pulling fs layer Step #1: 731f380c2ff1: Pulling fs layer Step #1: 4223d1ba77d3: Waiting Step #1: e3e240b0cd50: Waiting Step #1: fd03b6508997: Pulling fs layer Step #1: ff008d189a82: Pulling fs layer Step #1: b2512e0eab51: Waiting Step #1: 8d45a907f5ae: Waiting Step #1: 29aa799e57e6: Pulling fs layer Step #1: ae08d37ab679: Pulling fs layer Step #1: 35fa612f5131: Pulling fs layer Step #1: 11c964e3f593: Pulling fs layer Step #1: 44ae4f1bee4d: Waiting Step #1: 4e7bf651b6b4: Pulling fs layer Step #1: 7b105a7ee1bc: Pulling fs layer Step #1: af65c42a8b64: Waiting Step #1: 5e1d39d83edd: Waiting Step #1: 729758dd3f83: Pulling fs layer Step #1: a144ab822a62: Waiting Step #1: c744ce97d41c: Pulling fs layer Step #1: 1060217404f4: Pulling fs layer Step #1: bcbe3735701b: Waiting Step #1: 96c98dcd7e17: Waiting Step #1: 4540d92d5f59: Pulling fs layer Step #1: 5b7592b5a3b6: Pulling fs layer Step #1: 136e28fc29c9: Waiting Step #1: efddb1001a19: Waiting Step #1: 729758dd3f83: Waiting Step #1: 35fa612f5131: Waiting Step #1: fd03b6508997: Waiting Step #1: c744ce97d41c: Waiting Step #1: 731f380c2ff1: Waiting Step #1: ff008d189a82: Waiting Step #1: 11c964e3f593: Waiting Step #1: 1060217404f4: Waiting Step #1: 29aa799e57e6: Waiting Step #1: 4540d92d5f59: Waiting Step #1: ae08d37ab679: Waiting Step #1: 4e7bf651b6b4: Waiting Step #1: f2e49f1ff49e: Waiting Step #1: 7b105a7ee1bc: Waiting Step #1: 5b7592b5a3b6: Waiting Step #1: b1b7efa61c06: Waiting Step #1: 64c91e3d268f: Waiting Step #1: 3f7b104caa94: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 98d63d9f6c98: Verifying Checksum Step #1: 98d63d9f6c98: Download complete Step #1: 18e56a74fe3b: Verifying Checksum Step #1: 18e56a74fe3b: Download complete Step #1: d374a6bee675: Verifying Checksum Step #1: d374a6bee675: Download complete Step #1: f39d80ca7021: Download complete Step #1: e3e240b0cd50: Verifying Checksum Step #1: e3e240b0cd50: Download complete Step #1: b2512e0eab51: Verifying Checksum Step #1: b2512e0eab51: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8d45a907f5ae: Verifying Checksum Step #1: 8d45a907f5ae: Download complete Step #1: 44ae4f1bee4d: Verifying Checksum Step #1: 44ae4f1bee4d: Download complete Step #1: 5e1d39d83edd: Verifying Checksum Step #1: 5e1d39d83edd: Download complete Step #1: 96c98dcd7e17: Verifying Checksum Step #1: 96c98dcd7e17: Download complete Step #1: 136e28fc29c9: Verifying Checksum Step #1: 136e28fc29c9: Download complete Step #1: af65c42a8b64: Download complete Step #1: 4223d1ba77d3: Verifying Checksum Step #1: 4223d1ba77d3: Download complete Step #1: bcbe3735701b: Verifying Checksum Step #1: bcbe3735701b: Download complete Step #1: a144ab822a62: Verifying Checksum Step #1: a144ab822a62: Download complete Step #1: efddb1001a19: Verifying Checksum Step #1: efddb1001a19: Download complete Step #1: f2e49f1ff49e: Verifying Checksum Step #1: f2e49f1ff49e: Download complete Step #1: 2f0cc467e898: Verifying Checksum Step #1: 2f0cc467e898: Download complete Step #1: b1b7efa61c06: Verifying Checksum Step #1: b1b7efa61c06: Download complete Step #1: 64c91e3d268f: Verifying Checksum Step #1: 64c91e3d268f: Download complete Step #1: 731f380c2ff1: Download complete Step #1: fd03b6508997: Verifying Checksum Step #1: fd03b6508997: Download complete Step #1: ec334fd6e8fa: Verifying Checksum Step #1: ec334fd6e8fa: Download complete Step #1: ff008d189a82: Download complete Step #1: 35fa612f5131: Download complete Step #1: 29aa799e57e6: Verifying Checksum Step #1: 29aa799e57e6: Download complete Step #1: ae08d37ab679: Verifying Checksum Step #1: ae08d37ab679: Download complete Step #1: 7b105a7ee1bc: Download complete Step #1: 4e7bf651b6b4: Download complete Step #1: 11c964e3f593: Verifying Checksum Step #1: 11c964e3f593: Download complete Step #1: 729758dd3f83: Download complete Step #1: c744ce97d41c: Verifying Checksum Step #1: c744ce97d41c: Download complete Step #1: 1060217404f4: Download complete Step #1: 5b7592b5a3b6: Download complete Step #1: f39d80ca7021: Pull complete Step #1: 3f7b104caa94: Pull complete Step #1: 98d63d9f6c98: Pull complete Step #1: 4540d92d5f59: Verifying Checksum Step #1: 4540d92d5f59: Download complete Step #1: 18e56a74fe3b: Pull complete Step #1: d374a6bee675: Pull complete Step #1: ec334fd6e8fa: Pull complete Step #1: e3e240b0cd50: Pull complete Step #1: b2512e0eab51: Pull complete Step #1: 4223d1ba77d3: Pull complete Step #1: 8d45a907f5ae: Pull complete Step #1: 44ae4f1bee4d: Pull complete Step #1: 5e1d39d83edd: Pull complete Step #1: 96c98dcd7e17: Pull complete Step #1: 136e28fc29c9: Pull complete Step #1: af65c42a8b64: Pull complete Step #1: a144ab822a62: Pull complete Step #1: bcbe3735701b: Pull complete Step #1: efddb1001a19: Pull complete Step #1: f2e49f1ff49e: Pull complete Step #1: 2f0cc467e898: Pull complete Step #1: b1b7efa61c06: Pull complete Step #1: 64c91e3d268f: Pull complete Step #1: 731f380c2ff1: Pull complete Step #1: fd03b6508997: Pull complete Step #1: ff008d189a82: Pull complete Step #1: 29aa799e57e6: Pull complete Step #1: ae08d37ab679: Pull complete Step #1: 35fa612f5131: Pull complete Step #1: 11c964e3f593: Pull complete Step #1: 4e7bf651b6b4: Pull complete Step #1: 7b105a7ee1bc: Pull complete Step #1: 729758dd3f83: Pull complete Step #1: c744ce97d41c: Pull complete Step #1: 1060217404f4: Pull complete Step #1: 4540d92d5f59: Pull complete Step #1: 5b7592b5a3b6: Pull complete Step #1: Digest: sha256:cd2dc6ffe09b9b6a422307119bf4258e0ef9227a1e15b1010c905248b2d30dc8 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> e508a4fadc7c Step #1: Step 2/9 : ENV GOPATH="${GOPATH:-/root/go}" Step #1: ---> Running in 7420dcbd51b9 Step #1: Removing intermediate container 7420dcbd51b9 Step #1: ---> ea38a6b6370f Step #1: Step 3/9 : ENV ORG_ROOT="${GOPATH}/src/github.com/go-git" Step #1: ---> Running in 2f3cfa215921 Step #1: Removing intermediate container 2f3cfa215921 Step #1: ---> 5597d5b3566f Step #1: Step 4/9 : RUN mkdir -p "${ORG_ROOT}" Step #1: ---> Running in b155d63a575f Step #1: Removing intermediate container b155d63a575f Step #1: ---> be8787a0070c Step #1: Step 5/9 : ARG REPOSITORIES="go-git go-billy" Step #1: ---> Running in d80cdf1c2323 Step #1: Removing intermediate container d80cdf1c2323 Step #1: ---> 5b3e7096d09b Step #1: Step 6/9 : RUN for repo in ${REPOSITORIES}; do git clone --depth 1 "https://github.com/go-git/${repo}" "${ORG_ROOT}/${repo}"; cd "${ORG_ROOT}/${repo}"; go mod download; cd -; done Step #1: ---> Running in 288e2eea28c2 Step #1: Cloning into '/root/go/src/github.com/go-git/go-git'... Step #1: /src Step #1: Cloning into '/root/go/src/github.com/go-git/go-billy'... Step #1: /src Step #1: Removing intermediate container 288e2eea28c2 Step #1: ---> 2d5778cf4f0d Step #1: Step 7/9 : RUN go install golang.org/x/tools/cmd/goimports@latest Step #1: ---> Running in bd711247e51f Step #1: go: downloading golang.org/x/tools v0.29.0 Step #1: go: downloading golang.org/x/sync v0.10.0 Step #1: go: downloading golang.org/x/mod v0.22.0 Step #1: Removing intermediate container bd711247e51f Step #1: ---> c79c81e8f536 Step #1: Step 8/9 : COPY build.sh $SRC/ Step #1: ---> f2cdbb2b4b39 Step #1: Step 9/9 : WORKDIR $SRC Step #1: ---> Running in 1e765876f4bb Step #1: Removing intermediate container 1e765876f4bb Step #1: ---> 9e7145c9d1ed Step #1: Successfully built 9e7145c9d1ed Step #1: Successfully tagged gcr.io/oss-fuzz/go-git:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/go-git Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filenU5A6M Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-billy/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-billy Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-billy Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=18f878617b0e1dba74366c215a20cfb83f27cd78 Step #2 - "srcmap": + jq_inplace /tmp/filenU5A6M '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "18f878617b0e1dba74366c215a20cfb83f27cd78" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileJVQEDd Step #2 - "srcmap": + cat /tmp/filenU5A6M Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-billy" = { type: "git", url: "https://github.com/go-git/go-billy", rev: "18f878617b0e1dba74366c215a20cfb83f27cd78" }' Step #2 - "srcmap": + mv /tmp/fileJVQEDd /tmp/filenU5A6M Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /root/go/src/github.com/go-git/go-git/.git Step #2 - "srcmap": + GIT_DIR=/root/go/src/github.com/go-git/go-git Step #2 - "srcmap": + cd /root/go/src/github.com/go-git/go-git Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/go-git/go-git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=66f2eb7548a8f121822e50b915ae83cef27d694b Step #2 - "srcmap": + jq_inplace /tmp/filenU5A6M '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "66f2eb7548a8f121822e50b915ae83cef27d694b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileNzJWRJ Step #2 - "srcmap": + cat /tmp/filenU5A6M Step #2 - "srcmap": + jq '."/root/go/src/github.com/go-git/go-git" = { type: "git", url: "https://github.com/go-git/go-git", rev: "66f2eb7548a8f121822e50b915ae83cef27d694b" }' Step #2 - "srcmap": + mv /tmp/fileNzJWRJ /tmp/filenU5A6M Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filenU5A6M Step #2 - "srcmap": + rm /tmp/filenU5A6M Step #2 - "srcmap": { Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-billy": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-billy", Step #2 - "srcmap": "rev": "18f878617b0e1dba74366c215a20cfb83f27cd78" Step #2 - "srcmap": }, Step #2 - "srcmap": "/root/go/src/github.com/go-git/go-git": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/go-git/go-git", Step #2 - "srcmap": "rev": "66f2eb7548a8f121822e50b915ae83cef27d694b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + GOPATH=/root/go Step #3 - "compile-libfuzzer-coverage-x86_64": + ORG_ROOT=/root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + PREBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_prebuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + POSTBUILD_SCRIPT_PATH=tests/fuzz/oss_fuzz_postbuild.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + main Step #3 - "compile-libfuzzer-coverage-x86_64": + grep -h '^module github.com/go-git/' /src/go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": grep: /src/go.mod: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Going through all repositories in /root/go/src/github.com/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": Going through all repositories in /root/go/src/github.com/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + loop_through_org_repositories Step #3 - "compile-libfuzzer-coverage-x86_64": + local repos= Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find /root/go/src/github.com/go-git -type d -mindepth 1 -maxdepth 1 Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -mindepth after the argument -type, but global options are not positional, i.e., -mindepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": find: warning: you have specified the global option -maxdepth after the argument -type, but global options are not positional, i.e., -maxdepth affects tests specified before it as well as those specified after it. Please specify global options before other arguments. Step #3 - "compile-libfuzzer-coverage-x86_64": + repos='/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": /root/go/src/github.com/go-git/go-git' Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules=. Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-billy/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for repo in ${repos} Step #3 - "compile-libfuzzer-coverage-x86_64": + go_native_build_all_fuzzers /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + local project_path=/root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + source_prebuild_script Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f tests/fuzz/oss_fuzz_prebuild.sh ']' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ find . -mindepth 1 -maxdepth 4 -type f -name go.mod Step #3 - "compile-libfuzzer-coverage-x86_64": ++ cut -c 3- Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's|/[^/]*$$||' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sort -u Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;/go.mod;;g' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ sed 's;go.mod;.;g' Step #3 - "compile-libfuzzer-coverage-x86_64": + modules='cli/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": .' Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git/cli/go-git Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": ++ echo '' Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files= Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + continue Step #3 - "compile-libfuzzer-coverage-x86_64": + for module in ${modules} Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /root/go/src/github.com/go-git/go-git/. Step #3 - "compile-libfuzzer-coverage-x86_64": + local test_files Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -r '--include=**_test.go' --files-with-matches 'func Fuzz' . Step #3 - "compile-libfuzzer-coverage-x86_64": + test_files='./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkgName Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -h '^package ' -- blame.go blame_test.go common.go common_test.go doc.go example_test.go object_walker.go options.go options_test.go prune.go prune_test.go remote.go remote_test.go repository.go repository_plan9_test.go repository_test.go repository_unix_test.go repository_windows_test.go signer.go signer_test.go status.go submodule.go submodule_test.go transport.go worktree.go worktree_bsd.go worktree_commit.go worktree_commit_test.go worktree_js.go worktree_linux.go worktree_plan9.go worktree_status.go worktree_status_test.go worktree_test.go worktree_unix_other.go worktree_windows.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ head -n 1 Step #3 - "compile-libfuzzer-coverage-x86_64": + pkgName='package git' Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -z './plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ./internal/revision/parser_test.go' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + cat Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elazarl/goproxy/ext v0.0.0-20190711103511-473e67f1d7d2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/object/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparsesignedbytes Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/object Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/object/signature_test.go.FuzzParseSignedBytes into FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/object/signature_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package object Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParseSignedBytes(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(openPGPSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(x509SignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte(sshSignatureFormat[0])) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": parseSignedBytes(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/object FuzzParseSignedBytes FuzzParseSignedBytes Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/transport/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzznewendpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/transport Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/transport/transport_test.go.FuzzNewEndpoint into FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/transport/transport_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package transport Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzNewEndpoint(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("http://127.0.0.1:8080/foo.git") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("http://[::1]:8080/foo.git") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("file:///foo.git") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("ssh://git@github.com/user/repository.git") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("git@github.com:user/repository.git") Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": NewEndpoint(input) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/transport FuzzNewEndpoint FuzzNewEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/packfile/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzpatchdelta Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/packfile Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/packfile/delta_test.go.FuzzPatchDelta into FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/packfile/delta_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package packfile Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzPatchDelta(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\f\fsomenewvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0evalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x0e\x0eva")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("some value"), []byte("\n\x80\x80\x80\x80\x80\x802\x7fvalue")) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input1, input2 []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": PatchDelta(input1, input2) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/packfile FuzzPatchDelta FuzzPatchDelta Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/format/config/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzdecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/format/config Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/format/config/decoder_test.go.FuzzDecoder into FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/format/config/decoder_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package config Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzDecoder(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": d := NewDecoder(bytes.NewReader(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": cfg := &Config{} Step #3 - "compile-libfuzzer-coverage-x86_64": d.Decode(cfg) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/format/config FuzzDecoder FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./plumbing/protocol/packp/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzdecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./plumbing/protocol/packp Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./plumbing/protocol/packp/uppackresp_test.go.FuzzDecoder into FuzzDecoder' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./plumbing/protocol/packp/uppackresp_test.go.FuzzDecoder into FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./plumbing/protocol/packp/uppackresp_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package packp Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "io" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzDecoder(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("0045ACK 5dc01c595e6c6ec9ccda4f6f69c131c0dd945f81\n")) Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add([]byte("003aACK5dc01c595e6c6ec9ccda4f6f69c131c0dd945f82 \n0008NAK\n0")) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input []byte) { Step #3 - "compile-libfuzzer-coverage-x86_64": req := NewUploadPackRequest() Step #3 - "compile-libfuzzer-coverage-x86_64": res := NewUploadPackResponse(req) Step #3 - "compile-libfuzzer-coverage-x86_64": defer res.Close() Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": res.Decode(io.NopCloser(bytes.NewReader(input))) Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./plumbing/protocol/packp FuzzDecoder FuzzDecoder Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for file in ${test_files} Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -f ./internal/revision/go.mod ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^func Fuzz/!{/^func /,/^}/d}' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^\(var\|const\)\b/d; /^\s*\/\//d; /^\s*\/\*/,/\*\//d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i '/^type .* struct {/,/^}/d' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + go fmt ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + goimports -w ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -oP 'func \K(Fuzz\w*)' ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + targets=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + for target_name in ${targets} Step #3 - "compile-libfuzzer-coverage-x86_64": + local module_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local fuzzer_name Step #3 - "compile-libfuzzer-coverage-x86_64": + local target_dir Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=._ Step #3 - "compile-libfuzzer-coverage-x86_64": + module_name=. Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=fuzzparser Step #3 - "compile-libfuzzer-coverage-x86_64": + fuzzer_name=FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + target_dir=./internal/revision Step #3 - "compile-libfuzzer-coverage-x86_64": + echo 'Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser' Step #3 - "compile-libfuzzer-coverage-x86_64": Building ./internal/revision/parser_test.go.FuzzParser into FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": + cat ./internal/revision/parser_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": package revision Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": import ( Step #3 - "compile-libfuzzer-coverage-x86_64": "bytes" Step #3 - "compile-libfuzzer-coverage-x86_64": "testing" Step #3 - "compile-libfuzzer-coverage-x86_64": ) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": func FuzzParser(f *testing.F) { Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@{2016-12-16T21:42:47Z}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("@~3") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("v0.99.8^{}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("master:./README") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/fix nasty bug}") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add("HEAD^{/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/fix nasty bug") Step #3 - "compile-libfuzzer-coverage-x86_64": f.Add(":/[A-") Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": f.Fuzz(func(t *testing.T, input string) { Step #3 - "compile-libfuzzer-coverage-x86_64": parser := NewParser(bytes.NewBufferString(input)) Step #3 - "compile-libfuzzer-coverage-x86_64": parser.Parse() Step #3 - "compile-libfuzzer-coverage-x86_64": }) Step #3 - "compile-libfuzzer-coverage-x86_64": } Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer ./internal/revision FuzzParser FuzzParser Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f39d80ca7021: Already exists Step #4: 3f7b104caa94: Already exists Step #4: fb13a18b8d24: Pulling fs layer Step #4: 1e6f70e73fed: Pulling fs layer Step #4: c8c19f1a206d: Pulling fs layer Step #4: 0bccc74b0cc0: Pulling fs layer Step #4: fc73d508fba8: Pulling fs layer Step #4: 076d4d0c30b1: Pulling fs layer Step #4: 1763470f3f22: Pulling fs layer Step #4: 88fe58210e04: Pulling fs layer Step #4: a2d0fdcf2123: Pulling fs layer Step #4: 13a1399396a7: Pulling fs layer Step #4: 0f69f8b7d97d: Pulling fs layer Step #4: 46813ec47842: Pulling fs layer Step #4: 6860115fd42a: Pulling fs layer Step #4: 5256a36340c7: Pulling fs layer Step #4: 465e42175aa3: Pulling fs layer Step #4: 70d46b3445a4: Pulling fs layer Step #4: 2cf450df525b: Pulling fs layer Step #4: e491ffded19a: Pulling fs layer Step #4: 0b512f445b6d: Pulling fs layer Step #4: e9a0aa9dd6dc: Pulling fs layer Step #4: f235e0212358: Pulling fs layer Step #4: 0cdaacbae252: Pulling fs layer Step #4: 36c8153c465a: Pulling fs layer Step #4: 6860115fd42a: Waiting Step #4: 5256a36340c7: Waiting Step #4: 465e42175aa3: Waiting Step #4: 0bccc74b0cc0: Waiting Step #4: fc73d508fba8: Waiting Step #4: 70d46b3445a4: Waiting Step #4: 2cf450df525b: Waiting Step #4: e491ffded19a: Waiting Step #4: 0b512f445b6d: Waiting Step #4: e9a0aa9dd6dc: Waiting Step #4: f235e0212358: Waiting Step #4: 076d4d0c30b1: Waiting Step #4: 1763470f3f22: Waiting Step #4: 88fe58210e04: Waiting Step #4: a2d0fdcf2123: Waiting Step #4: 0cdaacbae252: Waiting Step #4: 36c8153c465a: Waiting Step #4: 13a1399396a7: Waiting Step #4: 0f69f8b7d97d: Waiting Step #4: 46813ec47842: Waiting Step #4: c8c19f1a206d: Download complete Step #4: fb13a18b8d24: Verifying Checksum Step #4: fb13a18b8d24: Download complete Step #4: 1e6f70e73fed: Verifying Checksum Step #4: 1e6f70e73fed: Download complete Step #4: fc73d508fba8: Download complete Step #4: fb13a18b8d24: Pull complete Step #4: 0bccc74b0cc0: Verifying Checksum Step #4: 0bccc74b0cc0: Download complete Step #4: 1763470f3f22: Verifying Checksum Step #4: 1763470f3f22: Download complete Step #4: 88fe58210e04: Verifying Checksum Step #4: 88fe58210e04: Download complete Step #4: a2d0fdcf2123: Download complete Step #4: 1e6f70e73fed: Pull complete Step #4: c8c19f1a206d: Pull complete Step #4: 076d4d0c30b1: Verifying Checksum Step #4: 076d4d0c30b1: Download complete Step #4: 0f69f8b7d97d: Verifying Checksum Step #4: 0f69f8b7d97d: Download complete Step #4: 46813ec47842: Verifying Checksum Step #4: 46813ec47842: Download complete Step #4: 6860115fd42a: Verifying Checksum Step #4: 6860115fd42a: Download complete Step #4: 0bccc74b0cc0: Pull complete Step #4: fc73d508fba8: Pull complete Step #4: 465e42175aa3: Verifying Checksum Step #4: 465e42175aa3: Download complete Step #4: 13a1399396a7: Verifying Checksum Step #4: 13a1399396a7: Download complete Step #4: 5256a36340c7: Verifying Checksum Step #4: 5256a36340c7: Download complete Step #4: 2cf450df525b: Verifying Checksum Step #4: 2cf450df525b: Download complete Step #4: e491ffded19a: Verifying Checksum Step #4: e491ffded19a: Download complete Step #4: 0b512f445b6d: Verifying Checksum Step #4: 0b512f445b6d: Download complete Step #4: e9a0aa9dd6dc: Verifying Checksum Step #4: e9a0aa9dd6dc: Download complete Step #4: 0cdaacbae252: Download complete Step #4: 70d46b3445a4: Verifying Checksum Step #4: 70d46b3445a4: Download complete Step #4: f235e0212358: Verifying Checksum Step #4: f235e0212358: Download complete Step #4: 076d4d0c30b1: Pull complete Step #4: 36c8153c465a: Verifying Checksum Step #4: 36c8153c465a: Download complete Step #4: 1763470f3f22: Pull complete Step #4: 88fe58210e04: Pull complete Step #4: a2d0fdcf2123: Pull complete Step #4: 13a1399396a7: Pull complete Step #4: 0f69f8b7d97d: Pull complete Step #4: 46813ec47842: Pull complete Step #4: 6860115fd42a: Pull complete Step #4: 5256a36340c7: Pull complete Step #4: 465e42175aa3: Pull complete Step #4: 70d46b3445a4: Pull complete Step #4: 2cf450df525b: Pull complete Step #4: e491ffded19a: Pull complete Step #4: 0b512f445b6d: Pull complete Step #4: e9a0aa9dd6dc: Pull complete Step #4: f235e0212358: Pull complete Step #4: 0cdaacbae252: Pull complete Step #4: 36c8153c465a: Pull complete Step #4: Digest: sha256:8a72aa1d5aca33da78cb3d3358c751907a98e497b6fc228853bb1a3867714c50 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/FuzzDecoder.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzDecoder.zip or Step #5: /corpus/FuzzDecoder.zip.zip, and cannot find /corpus/FuzzDecoder.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzDecoder. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzNewEndpoint.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzNewEndpoint.zip or Step #5: /corpus/FuzzNewEndpoint.zip.zip, and cannot find /corpus/FuzzNewEndpoint.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzNewEndpoint. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzParseSignedBytes.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzParseSignedBytes.zip or Step #5: /corpus/FuzzParseSignedBytes.zip.zip, and cannot find /corpus/FuzzParseSignedBytes.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzParseSignedBytes. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzParser.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzParser.zip or Step #5: /corpus/FuzzParser.zip.zip, and cannot find /corpus/FuzzParser.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzParser. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/FuzzPatchDelta.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/FuzzPatchDelta.zip or Step #5: /corpus/FuzzPatchDelta.zip.zip, and cannot find /corpus/FuzzPatchDelta.zip.ZIP, period. Step #5: Failed to unpack the corpus for FuzzPatchDelta. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image go-git Step #5: python infra/helper.py build_fuzzers --sanitizer coverage go-git Step #5: python infra/helper.py coverage go-git Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1