starting build "c47eb6e1-864f-46a8-a53d-5d2d95264a9b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 18.43kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 89d02f7aa105: Pulling fs layer Step #1: 8ddf7f2f1afd: Pulling fs layer Step #1: 953d024f972e: Pulling fs layer Step #1: 73e4c1a95d7c: Pulling fs layer Step #1: 020e2a8ae453: Pulling fs layer Step #1: 2acedd8e811d: Pulling fs layer Step #1: 802a6d21accc: Pulling fs layer Step #1: d43675a77318: Pulling fs layer Step #1: 6b73abbe7e10: Pulling fs layer Step #1: d4b1706c862d: Pulling fs layer Step #1: 4048c2589592: Pulling fs layer Step #1: 12ad58c9f342: Pulling fs layer Step #1: dee138f71a27: Pulling fs layer Step #1: 72540e57f36d: Pulling fs layer Step #1: 7e8d67df18fb: Pulling fs layer Step #1: 825049a9716f: Pulling fs layer Step #1: c54231abef85: Pulling fs layer Step #1: 3ade40efbbb6: Pulling fs layer Step #1: 953d024f972e: Waiting Step #1: d43675a77318: Waiting Step #1: 1ad21c5cbdd1: Pulling fs layer Step #1: fc0edc2d2b23: Pulling fs layer Step #1: 00ada1e933ba: Pulling fs layer Step #1: 4048c2589592: Waiting Step #1: 543b6d759c6d: Pulling fs layer Step #1: 12ad58c9f342: Waiting Step #1: 46c7309e1ad1: Pulling fs layer Step #1: d4b1706c862d: Waiting Step #1: 66229b962aa0: Pulling fs layer Step #1: dee138f71a27: Waiting Step #1: 8617b294b338: Pulling fs layer Step #1: 72540e57f36d: Waiting Step #1: 97a033adfc50: Pulling fs layer Step #1: 7e8d67df18fb: Waiting Step #1: 3ade40efbbb6: Waiting Step #1: 825049a9716f: Waiting Step #1: 606b27214ffd: Pulling fs layer Step #1: c54231abef85: Waiting Step #1: 1ad21c5cbdd1: Waiting Step #1: 768c386681d6: Pulling fs layer Step #1: acbe71f55854: Pulling fs layer Step #1: fc0edc2d2b23: Waiting Step #1: 8ce76d92792e: Pulling fs layer Step #1: 543b6d759c6d: Waiting Step #1: 411da31e4e7a: Pulling fs layer Step #1: 63bd8a02ea72: Pulling fs layer Step #1: 46c7309e1ad1: Waiting Step #1: 29e671cfdcfa: Pulling fs layer Step #1: 66229b962aa0: Waiting Step #1: b66512f8c3bc: Pulling fs layer Step #1: 8617b294b338: Waiting Step #1: 768c386681d6: Waiting Step #1: 71deca3326ce: Pulling fs layer Step #1: 97a033adfc50: Waiting Step #1: 8317e842993c: Pulling fs layer Step #1: 606b27214ffd: Waiting Step #1: 73e4c1a95d7c: Waiting Step #1: 020e2a8ae453: Waiting Step #1: acbe71f55854: Waiting Step #1: 8ce76d92792e: Waiting Step #1: 2acedd8e811d: Waiting Step #1: 802a6d21accc: Waiting Step #1: 29e671cfdcfa: Waiting Step #1: b66512f8c3bc: Waiting Step #1: 71deca3326ce: Waiting Step #1: 8317e842993c: Waiting Step #1: 8ddf7f2f1afd: Verifying Checksum Step #1: 8ddf7f2f1afd: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 73e4c1a95d7c: Download complete Step #1: 953d024f972e: Verifying Checksum Step #1: 953d024f972e: Download complete Step #1: 020e2a8ae453: Download complete Step #1: 89d02f7aa105: Download complete Step #1: 802a6d21accc: Download complete Step #1: d43675a77318: Verifying Checksum Step #1: d43675a77318: Download complete Step #1: b549f31133a9: Pull complete Step #1: d4b1706c862d: Verifying Checksum Step #1: d4b1706c862d: Download complete Step #1: 4048c2589592: Verifying Checksum Step #1: 4048c2589592: Download complete Step #1: 12ad58c9f342: Verifying Checksum Step #1: 12ad58c9f342: Download complete Step #1: dee138f71a27: Verifying Checksum Step #1: dee138f71a27: Download complete Step #1: 72540e57f36d: Verifying Checksum Step #1: 72540e57f36d: Download complete Step #1: 6b73abbe7e10: Verifying Checksum Step #1: 6b73abbe7e10: Download complete Step #1: 7e8d67df18fb: Download complete Step #1: 825049a9716f: Verifying Checksum Step #1: 825049a9716f: Download complete Step #1: c54231abef85: Verifying Checksum Step #1: c54231abef85: Download complete Step #1: 3ade40efbbb6: Verifying Checksum Step #1: 3ade40efbbb6: Download complete Step #1: 1ad21c5cbdd1: Verifying Checksum Step #1: 1ad21c5cbdd1: Download complete Step #1: fc0edc2d2b23: Verifying Checksum Step #1: fc0edc2d2b23: Download complete Step #1: 00ada1e933ba: Verifying Checksum Step #1: 00ada1e933ba: Download complete Step #1: 46c7309e1ad1: Verifying Checksum Step #1: 46c7309e1ad1: Download complete Step #1: 543b6d759c6d: Verifying Checksum Step #1: 543b6d759c6d: Download complete Step #1: 66229b962aa0: Download complete Step #1: 2acedd8e811d: Verifying Checksum Step #1: 2acedd8e811d: Download complete Step #1: 8617b294b338: Verifying Checksum Step #1: 8617b294b338: Download complete Step #1: 97a033adfc50: Verifying Checksum Step #1: 97a033adfc50: Download complete Step #1: 606b27214ffd: Verifying Checksum Step #1: 606b27214ffd: Download complete Step #1: 768c386681d6: Verifying Checksum Step #1: 768c386681d6: Download complete Step #1: 8ce76d92792e: Verifying Checksum Step #1: 8ce76d92792e: Download complete Step #1: acbe71f55854: Verifying Checksum Step #1: acbe71f55854: Download complete Step #1: 411da31e4e7a: Verifying Checksum Step #1: 411da31e4e7a: Download complete Step #1: 89d02f7aa105: Pull complete Step #1: 63bd8a02ea72: Verifying Checksum Step #1: 63bd8a02ea72: Download complete Step #1: 8ddf7f2f1afd: Pull complete Step #1: 29e671cfdcfa: Verifying Checksum Step #1: 29e671cfdcfa: Download complete Step #1: b66512f8c3bc: Verifying Checksum Step #1: b66512f8c3bc: Download complete Step #1: 8317e842993c: Download complete Step #1: 953d024f972e: Pull complete Step #1: 73e4c1a95d7c: Pull complete Step #1: 020e2a8ae453: Pull complete Step #1: 71deca3326ce: Verifying Checksum Step #1: 71deca3326ce: Download complete Step #1: 2acedd8e811d: Pull complete Step #1: 802a6d21accc: Pull complete Step #1: d43675a77318: Pull complete Step #1: 6b73abbe7e10: Pull complete Step #1: d4b1706c862d: Pull complete Step #1: 4048c2589592: Pull complete Step #1: 12ad58c9f342: Pull complete Step #1: dee138f71a27: Pull complete Step #1: 72540e57f36d: Pull complete Step #1: 7e8d67df18fb: Pull complete Step #1: 825049a9716f: Pull complete Step #1: c54231abef85: Pull complete Step #1: 3ade40efbbb6: Pull complete Step #1: 1ad21c5cbdd1: Pull complete Step #1: fc0edc2d2b23: Pull complete Step #1: 00ada1e933ba: Pull complete Step #1: 543b6d759c6d: Pull complete Step #1: 46c7309e1ad1: Pull complete Step #1: 66229b962aa0: Pull complete Step #1: 8617b294b338: Pull complete Step #1: 97a033adfc50: Pull complete Step #1: 606b27214ffd: Pull complete Step #1: 768c386681d6: Pull complete Step #1: acbe71f55854: Pull complete Step #1: 8ce76d92792e: Pull complete Step #1: 411da31e4e7a: Pull complete Step #1: 63bd8a02ea72: Pull complete Step #1: 29e671cfdcfa: Pull complete Step #1: b66512f8c3bc: Pull complete Step #1: 71deca3326ce: Pull complete Step #1: 8317e842993c: Pull complete Step #1: Digest: sha256:a107c42facb79a0c6a73aee2759c630e6b66127a02726efc07355ba676e7698e Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 5f86224f345a Step #1: Step 2/7 : RUN git clone --depth 1 https://github.com/open-telemetry/opentelemetry-collector Step #1: ---> Running in 0deda642af67 Step #1: Cloning into 'opentelemetry-collector'... Step #1: Removing intermediate container 0deda642af67 Step #1: ---> 1622cc99eecf Step #1: Step 3/7 : RUN git clone --depth=1 --branch=include-all-test-files https://github.com/AdamKorcz/go-118-fuzz-build $SRC/go-118-fuzz-build Step #1: ---> Running in 866a46535a06 Step #1: Cloning into '/src/go-118-fuzz-build'... Step #1: Removing intermediate container 866a46535a06 Step #1: ---> 72907f129ade Step #1: Step 4/7 : RUN git clone --depth=1 https://github.com/dvyukov/go-fuzz-corpus Step #1: ---> Running in d51d2eae7dd6 Step #1: Cloning into 'go-fuzz-corpus'... Step #1: Updating files: 37% (23116/60861) Updating files: 38% (23128/60861) Updating files: 39% (23736/60861) Updating files: 40% (24345/60861) Updating files: 41% (24954/60861) Updating files: 42% (25562/60861) Updating files: 43% (26171/60861) Updating files: 44% (26779/60861) Updating files: 45% (27388/60861) Updating files: 46% (27997/60861) Updating files: 47% (28605/60861) Updating files: 48% (29214/60861) Updating files: 49% (29822/60861) Updating files: 50% (30431/60861) Updating files: 51% (31040/60861) Updating files: 52% (31648/60861) Updating files: 53% (32257/60861) Updating files: 54% (32865/60861) Updating files: 55% (33474/60861) Updating files: 56% (34083/60861) Updating files: 57% (34691/60861) Updating files: 58% (35300/60861) Updating files: 59% (35908/60861) Updating files: 60% (36517/60861) Updating files: 61% (37126/60861) Updating files: 62% (37734/60861) Updating files: 63% (38343/60861) Updating files: 64% (38952/60861) Updating files: 65% (39560/60861) Updating files: 66% (40169/60861) Updating files: 67% (40777/60861) Updating files: 68% (41386/60861) Updating files: 69% (41995/60861) Updating files: 70% (42603/60861) Updating files: 71% (43212/60861) Updating files: 72% (43820/60861) Updating files: 73% (44429/60861) Updating files: 74% (45038/60861) Updating files: 75% (45646/60861) Updating files: 75% (45722/60861) Updating files: 76% (46255/60861) Updating files: 77% (46863/60861) Updating files: 78% (47472/60861) Updating files: 79% (48081/60861) Updating files: 80% (48689/60861) Updating files: 81% (49298/60861) Updating files: 82% (49907/60861) Updating files: 83% (50515/60861) Updating files: 84% (51124/60861) Updating files: 85% (51732/60861) Updating files: 86% (52341/60861) Updating files: 87% (52950/60861) Updating files: 88% (53558/60861) Updating files: 89% (54167/60861) Updating files: 90% (54775/60861) Updating files: 91% (55384/60861) Updating files: 92% (55993/60861) Updating files: 93% (56601/60861) Updating files: 94% (57210/60861) Updating files: 95% (57818/60861) Updating files: 96% (58427/60861) Updating files: 97% (59036/60861) Updating files: 98% (59644/60861) Updating files: 99% (60253/60861) Updating files: 100% (60861/60861) Updating files: 100% (60861/60861), done. Step #1: Removing intermediate container d51d2eae7dd6 Step #1: ---> e7b03c869209 Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/AdamKorcz/opentelemetry-collector-contrib --branch=fuzz Step #1: ---> Running in 98dc4169fb53 Step #1: Cloning into 'opentelemetry-collector-contrib'... Step #1: Removing intermediate container 98dc4169fb53 Step #1: ---> 133e15396661 Step #1: Step 6/7 : WORKDIR opentelemetry-collector Step #1: ---> Running in 71008514c016 Step #1: Removing intermediate container 71008514c016 Step #1: ---> 5c49f7202b44 Step #1: Step 7/7 : COPY build.sh dict $SRC/ Step #1: ---> b0a7e837c95e Step #1: Successfully built b0a7e837c95e Step #1: Successfully tagged gcr.io/oss-fuzz/opentelemetry:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/opentelemetry Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileJzHWBP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/opentelemetry-collector-contrib/.git Step #2 - "srcmap": + GIT_DIR=/src/opentelemetry-collector-contrib Step #2 - "srcmap": + cd /src/opentelemetry-collector-contrib Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/opentelemetry-collector-contrib Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a7f8a1fb106ba37d5eaaf47b8bb3465ec4cbeeee Step #2 - "srcmap": + jq_inplace /tmp/fileJzHWBP '."/src/opentelemetry-collector-contrib" = { type: "git", url: "https://github.com/AdamKorcz/opentelemetry-collector-contrib", rev: "a7f8a1fb106ba37d5eaaf47b8bb3465ec4cbeeee" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file9aFoBd Step #2 - "srcmap": + cat /tmp/fileJzHWBP Step #2 - "srcmap": + jq '."/src/opentelemetry-collector-contrib" = { type: "git", url: "https://github.com/AdamKorcz/opentelemetry-collector-contrib", rev: "a7f8a1fb106ba37d5eaaf47b8bb3465ec4cbeeee" }' Step #2 - "srcmap": + mv /tmp/file9aFoBd /tmp/fileJzHWBP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-fuzz-corpus/.git Step #2 - "srcmap": + GIT_DIR=/src/go-fuzz-corpus Step #2 - "srcmap": + cd /src/go-fuzz-corpus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/dvyukov/go-fuzz-corpus Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c42c1b2914c7503500996ee15927d3ab3d2ba968 Step #2 - "srcmap": + jq_inplace /tmp/fileJzHWBP '."/src/go-fuzz-corpus" = { type: "git", url: "https://github.com/dvyukov/go-fuzz-corpus", rev: "c42c1b2914c7503500996ee15927d3ab3d2ba968" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileVY83AH Step #2 - "srcmap": + cat /tmp/fileJzHWBP Step #2 - "srcmap": + jq '."/src/go-fuzz-corpus" = { type: "git", url: "https://github.com/dvyukov/go-fuzz-corpus", rev: "c42c1b2914c7503500996ee15927d3ab3d2ba968" }' Step #2 - "srcmap": + mv /tmp/fileVY83AH /tmp/fileJzHWBP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=eb91380d8434900ab7050075a7070e068e4e8327 Step #2 - "srcmap": + jq_inplace /tmp/fileJzHWBP '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "eb91380d8434900ab7050075a7070e068e4e8327" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileCOvc0c Step #2 - "srcmap": + cat /tmp/fileJzHWBP Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "eb91380d8434900ab7050075a7070e068e4e8327" }' Step #2 - "srcmap": + mv /tmp/fileCOvc0c /tmp/fileJzHWBP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/opentelemetry-collector/.git Step #2 - "srcmap": + GIT_DIR=/src/opentelemetry-collector Step #2 - "srcmap": + cd /src/opentelemetry-collector Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/open-telemetry/opentelemetry-collector Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=e6a5aeed7b12760f57ccac66e02f0828956f6517 Step #2 - "srcmap": + jq_inplace /tmp/fileJzHWBP '."/src/opentelemetry-collector" = { type: "git", url: "https://github.com/open-telemetry/opentelemetry-collector", rev: "e6a5aeed7b12760f57ccac66e02f0828956f6517" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileew1KQJ Step #2 - "srcmap": + cat /tmp/fileJzHWBP Step #2 - "srcmap": + jq '."/src/opentelemetry-collector" = { type: "git", url: "https://github.com/open-telemetry/opentelemetry-collector", rev: "e6a5aeed7b12760f57ccac66e02f0828956f6517" }' Step #2 - "srcmap": + mv /tmp/fileew1KQJ /tmp/fileJzHWBP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileJzHWBP Step #2 - "srcmap": + rm /tmp/fileJzHWBP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/opentelemetry-collector-contrib": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/opentelemetry-collector-contrib", Step #2 - "srcmap": "rev": "a7f8a1fb106ba37d5eaaf47b8bb3465ec4cbeeee" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/go-fuzz-corpus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/dvyukov/go-fuzz-corpus", Step #2 - "srcmap": "rev": "c42c1b2914c7503500996ee15927d3ab3d2ba968" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "eb91380d8434900ab7050075a7070e068e4e8327" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/opentelemetry-collector": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/open-telemetry/opentelemetry-collector", Step #2 - "srcmap": "rev": "e6a5aeed7b12760f57ccac66e02f0828956f6517" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go build . Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + mv go-118-fuzz-build /root/go/bin/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/opentelemetry-collector-contrib Step #3 - "compile-libfuzzer-coverage-x86_64": + cd processor/groupbyattrsprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package groupbyattrsprocessor \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/component v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configtelemetry v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/component/componenttest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/consumer/consumertest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/pdata v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/processor v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/processor/processortest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/confmap v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/consumer v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/pipeline v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/component/componentstatus v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/consumer/xconsumer v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/pdata/testdata v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/processor/xprocessor v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/pdata/pprofile v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-viper/mapstructure/v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/knadh/koanf/providers/confmap v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/knadh/koanf/maps v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/knadh/koanf/v2 v2.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/copystructure v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/reflectwalk v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.69.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20241015192408-796eee8c2d53 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/groupbyattrsprocessor FuzzProcessTraces FuzzProcessTraces_groupbyattrsprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/groupbyattrsprocessor FuzzProcessLogs FuzzProcessLogs_groupbyattrsprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/groupbyattrsprocessor FuzzProcessMetrics FuzzProcessMetrics_groupbyattrsprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../logdedupprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package logdedupprocessor \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/participle/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goccy/go-json v0.10.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/iancoleman/strcase v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240506185415-9bf2ced13842 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elastic/lunes v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru/v2 v2.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/elastic/go-grok v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gobwas/glob v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ua-parser/uap-go v0.0.0-20240611065828-3a4781585db6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antchfx/xmlquery v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/semconv v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antchfx/xpath v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/golang-lru v0.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magefile/mage v1.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/assert/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/repr v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hexops/gotextdiff v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/logdedupprocessor FuzzConsumeLogs FuzzConsumeLogs_logdedupprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../probabilisticsamplerprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package probabilisticsamplerprocessor \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/otelcol/otelcoltest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20241104194629-dd2ea8efbc28 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/otelcol v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/service v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/confmap/provider/fileprovider v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/confmap/provider/envprovider v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/connector v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/confmap/provider/yamlprovider v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/receiver v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/confmap/provider/httpprovider v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/extensiontest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/connector/connectortest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/exporter v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/exporter/exportertest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/receiver/receivertest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/featuregate v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/config v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-version v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlplog/otlploghttp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/log v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetrichttp v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdouttrace v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutlog v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/stdout/stdoutmetric v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/log v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/internal/fanoutconsumer v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/connector/xconnector v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/prometheus v0.54.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlpmetric/otlpmetricgrpc v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/receiver/xreceiver v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/consumer/consumererror v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/pipeline/xpipeline v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/exporter/xexporter v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/experimental/storage v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configretry v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/bridges/otelzap v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/extensioncapabilities v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/propagators/b3 v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gonum.org/v1/gonum v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/confighttp v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shirou/gopsutil/v4 v4.24.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/zpagesextension v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/zpages v0.56.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/snappy v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rs/cors v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/internal v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configtls v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configauth v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/client v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/auth v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.56.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configopaque v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configcompression v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pierrec/lz4/v4 v4.1.21 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tklauser/go-sysconf v0.3.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/yusufpapurcu/wmi v1.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/power-devops/perfstat v0.0.0-20210106213030-5aafc221ea8c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/ebitengine/purego v0.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lufia/plan9stats v0.0.0-20211012122336-39d0f177ccd0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ole/go-ole v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tklauser/numcpus v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20241104194629-dd2ea8efbc28 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/probabilisticsamplerprocessor FuzzConsumeTraces FuzzConsumeTraces_probabilisticsamplerprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/probabilisticsamplerprocessor FuzzConsumeLogs FuzzConsumeLogs__probabilisticsamplerprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../sumologicprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package sumologicprocessor \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/sumologicprocessor FuzzProcessTraces FuzzProcessTraces_sumologicprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/sumologicprocessor FuzzProcessLogs FuzzProcessLogs_sumologicprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/sumologicprocessor FuzzProcessMetrics FuzzProcessMetrics_sumologicprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../tailsamplingprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package tailsamplingprocessor \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/processor/tailsamplingprocessor FuzzConsumeTraces FuzzConsumeTraces_tailsamplingprocessor Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../receiver/lokireceiver/internal Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package internal \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grafana/loki/pkg/push v0.0.0-20240514112848-a1b1eeb09583 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/configgrpc v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/buger/jsonparser v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/config/confignet v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logfmt/logfmt v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/prometheus v0.54.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mostynb/go-grpc-compression v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.56.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20240325151524-a685a6edb6d8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/extension/auth/authtest v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/atomic v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-kit/log v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/oklog/ulid v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dennwc/varint v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/bboreham/go-loser v0.0.0-20230920113527-fcc2c21820a3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/units v0.0.0-20240626203959-61d1e3462e30 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common/sigv4 v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go v1.54.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jpillora/backoff v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.29.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jmespath/go-jmespath v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/receiver/lokireceiver/internal FuzzParseRequest FuzzParseRequest_loki Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../mongodbatlasreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package mongodbatlasreceiver \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/filter v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mongodb-forks/digest v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mongodb.org/atlas v0.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector/scraper v0.116.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leodido/go-syslog/v4 v4.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/valyala/fastjson v1.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/expr-lang/expr v1.16.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/leodido/ragel-machinery v0.0.0-20190525184631-5f46317e436b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-test/deep v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-querystring v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/receiver/mongodbatlasreceiver FuzzHandleReq FuzzHandleReq_mongodbatlasreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../sapmreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package sapmreceiver \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/mux v1.8.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/signalfx/sapm-proto v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jaegertracing/jaeger v1.62.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/collector v0.111.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/apache/thrift v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/receiver/sapmreceiver FuzzParseTraceV2Request FuzzParseTraceV2Request_sapmreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../signalfxreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package signalfxreceiver \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/signalfx/com_signalfx_metrics_protobuf v0.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shirou/gopsutil/v4 v4.24.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/receiver/signalfxreceiver FuzzHandleDatapointReq FuzzHandleDatapointReq_signalfxreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../splunkhecreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package splunkhecreceiver \nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/testcontainers/testcontainers-go v0.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/docker v27.3.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-connections v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/magiconair/properties v1.8.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/dockercfg v0.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/patternmatcher v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/term v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shirou/gopsutil/v3 v3.24.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shoenig/go-m1cpu v0.1.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/morikuni/aec v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/docker-image-spec v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod edit -replace github.com/AdamKorcz/go-118-fuzz-build=/src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": ++ go list Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/open-telemetry/opentelemetry-collector-contrib/receiver/splunkhecreceiver FuzzHandleRawReq FuzzHandleRawReq_splunkhecreceiver Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/open-telemetry/opentelemetry-collector-contrib/receiver/splunkhecreceiver [github.com/open-telemetry/opentelemetry-collector-contrib/receiver/splunkhecreceiver.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzz_test.go:26:15: undefined: newLogsReceiver Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image opentelemetry Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 opentelemetry Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1