starting build "e39c04f5-117d-4467-ae2d-5f0988af1d19" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 160496dfdc1e: Pulling fs layer Step #1: e2c1e6ffb55e: Pulling fs layer Step #1: 790f0b60d601: Pulling fs layer Step #1: ba5377523637: Pulling fs layer Step #1: fcf19af99e9b: Pulling fs layer Step #1: c120616e8611: Pulling fs layer Step #1: 648979ff9271: Pulling fs layer Step #1: 38b58f40b986: Pulling fs layer Step #1: 6fec27639895: Pulling fs layer Step #1: 6311c17bee61: Pulling fs layer Step #1: 63cd1cde0eec: Pulling fs layer Step #1: 1ef02760f71f: Pulling fs layer Step #1: fda5a71c8862: Pulling fs layer Step #1: 7ad2f7c615a2: Pulling fs layer Step #1: 0b07407e6342: Pulling fs layer Step #1: fbed995eca46: Pulling fs layer Step #1: 4381c7f8884c: Pulling fs layer Step #1: bd3393df7542: Pulling fs layer Step #1: f8afaf16f210: Pulling fs layer Step #1: 086216b75b6f: Pulling fs layer Step #1: ebb3d4059a93: Pulling fs layer Step #1: 1cb7b39b268b: Pulling fs layer Step #1: fd1f752e3c9f: Pulling fs layer Step #1: 84db406b755d: Pulling fs layer Step #1: 3968f7202bef: Pulling fs layer Step #1: 790f0b60d601: Waiting Step #1: 37c0a55501a4: Pulling fs layer Step #1: fddacf1580ff: Pulling fs layer Step #1: ba5377523637: Waiting Step #1: 3c790d5687e6: Pulling fs layer Step #1: fcf19af99e9b: Waiting Step #1: 0fcda4deea49: Pulling fs layer Step #1: cfc1aaab3799: Pulling fs layer Step #1: c120616e8611: Waiting Step #1: 648979ff9271: Waiting Step #1: 5764b068ae0e: Pulling fs layer Step #1: ca6809cc8eb6: Pulling fs layer Step #1: 4e3caf1176dc: Pulling fs layer Step #1: 38b58f40b986: Waiting Step #1: 4004435cf3c9: Pulling fs layer Step #1: 6fec27639895: Waiting Step #1: 6311c17bee61: Waiting Step #1: 63cd1cde0eec: Waiting Step #1: 1cb7b39b268b: Waiting Step #1: 3c790d5687e6: Waiting Step #1: 0fcda4deea49: Waiting Step #1: fda5a71c8862: Waiting Step #1: 4e3caf1176dc: Waiting Step #1: 1ef02760f71f: Waiting Step #1: 4004435cf3c9: Waiting Step #1: ca6809cc8eb6: Waiting Step #1: 0b07407e6342: Waiting Step #1: fbed995eca46: Waiting Step #1: 4381c7f8884c: Waiting Step #1: f8afaf16f210: Waiting Step #1: 84db406b755d: Waiting Step #1: 5764b068ae0e: Waiting Step #1: ebb3d4059a93: Waiting Step #1: fd1f752e3c9f: Waiting Step #1: cfc1aaab3799: Waiting Step #1: 3968f7202bef: Waiting Step #1: fddacf1580ff: Waiting Step #1: 7ad2f7c615a2: Waiting Step #1: e2c1e6ffb55e: Verifying Checksum Step #1: e2c1e6ffb55e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ba5377523637: Verifying Checksum Step #1: ba5377523637: Download complete Step #1: fcf19af99e9b: Verifying Checksum Step #1: fcf19af99e9b: Download complete Step #1: 790f0b60d601: Verifying Checksum Step #1: 790f0b60d601: Download complete Step #1: 648979ff9271: Verifying Checksum Step #1: 648979ff9271: Download complete Step #1: 160496dfdc1e: Verifying Checksum Step #1: 160496dfdc1e: Download complete Step #1: 38b58f40b986: Verifying Checksum Step #1: 38b58f40b986: Download complete Step #1: b549f31133a9: Pull complete Step #1: 6311c17bee61: Verifying Checksum Step #1: 6311c17bee61: Download complete Step #1: 63cd1cde0eec: Verifying Checksum Step #1: 63cd1cde0eec: Download complete Step #1: 1ef02760f71f: Verifying Checksum Step #1: 1ef02760f71f: Download complete Step #1: fda5a71c8862: Download complete Step #1: 7ad2f7c615a2: Download complete Step #1: 0b07407e6342: Verifying Checksum Step #1: 0b07407e6342: Download complete Step #1: 6fec27639895: Verifying Checksum Step #1: 6fec27639895: Download complete Step #1: 4381c7f8884c: Verifying Checksum Step #1: 4381c7f8884c: Download complete Step #1: fbed995eca46: Verifying Checksum Step #1: fbed995eca46: Download complete Step #1: f8afaf16f210: Verifying Checksum Step #1: f8afaf16f210: Download complete Step #1: bd3393df7542: Download complete Step #1: 086216b75b6f: Download complete Step #1: ebb3d4059a93: Verifying Checksum Step #1: ebb3d4059a93: Download complete Step #1: 1cb7b39b268b: Verifying Checksum Step #1: 1cb7b39b268b: Download complete Step #1: fd1f752e3c9f: Download complete Step #1: c120616e8611: Verifying Checksum Step #1: c120616e8611: Download complete Step #1: 84db406b755d: Download complete Step #1: 3968f7202bef: Verifying Checksum Step #1: 3968f7202bef: Download complete Step #1: 37c0a55501a4: Verifying Checksum Step #1: 37c0a55501a4: Download complete Step #1: fddacf1580ff: Verifying Checksum Step #1: fddacf1580ff: Download complete Step #1: 3c790d5687e6: Verifying Checksum Step #1: 3c790d5687e6: Download complete Step #1: 0fcda4deea49: Download complete Step #1: cfc1aaab3799: Download complete Step #1: 5764b068ae0e: Verifying Checksum Step #1: 5764b068ae0e: Download complete Step #1: ca6809cc8eb6: Download complete Step #1: 160496dfdc1e: Pull complete Step #1: e2c1e6ffb55e: Pull complete Step #1: 4004435cf3c9: Verifying Checksum Step #1: 4004435cf3c9: Download complete Step #1: 790f0b60d601: Pull complete Step #1: ba5377523637: Pull complete Step #1: fcf19af99e9b: Pull complete Step #1: 4e3caf1176dc: Verifying Checksum Step #1: 4e3caf1176dc: Download complete Step #1: c120616e8611: Pull complete Step #1: 648979ff9271: Pull complete Step #1: 38b58f40b986: Pull complete Step #1: 6fec27639895: Pull complete Step #1: 6311c17bee61: Pull complete Step #1: 63cd1cde0eec: Pull complete Step #1: 1ef02760f71f: Pull complete Step #1: fda5a71c8862: Pull complete Step #1: 7ad2f7c615a2: Pull complete Step #1: 0b07407e6342: Pull complete Step #1: fbed995eca46: Pull complete Step #1: 4381c7f8884c: Pull complete Step #1: bd3393df7542: Pull complete Step #1: f8afaf16f210: Pull complete Step #1: 086216b75b6f: Pull complete Step #1: ebb3d4059a93: Pull complete Step #1: 1cb7b39b268b: Pull complete Step #1: fd1f752e3c9f: Pull complete Step #1: 84db406b755d: Pull complete Step #1: 3968f7202bef: Pull complete Step #1: 37c0a55501a4: Pull complete Step #1: fddacf1580ff: Pull complete Step #1: 3c790d5687e6: Pull complete Step #1: 0fcda4deea49: Pull complete Step #1: cfc1aaab3799: Pull complete Step #1: 5764b068ae0e: Pull complete Step #1: ca6809cc8eb6: Pull complete Step #1: 4e3caf1176dc: Pull complete Step #1: 4004435cf3c9: Pull complete Step #1: Digest: sha256:225cd83438a87e622e52d1845e40199d59a2c171c00cbb8bc5e736a33564d95d Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 0280c66864b0 Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/withastro/compiler.git Step #1: ---> Running in 83d4245dfb26 Step #1: Cloning into 'compiler'... Step #1: Removing intermediate container 83d4245dfb26 Step #1: ---> bb0d86ca9590 Step #1: Step 3/5 : RUN go install github.com/AdamKorcz/go-118-fuzz-build@latest Step #1: ---> Running in 5b9fb2dcb80b Step #1: go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #1: Removing intermediate container 5b9fb2dcb80b Step #1: ---> 99cb5921755f Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> b65c931e5a8c Step #1: Step 5/5 : WORKDIR $SRC/compiler Step #1: ---> Running in d9c37222d03e Step #1: Removing intermediate container d9c37222d03e Step #1: ---> 05964d82b66f Step #1: Successfully built 05964d82b66f Step #1: Successfully tagged gcr.io/oss-fuzz/astro-compiler:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/astro-compiler Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filemVSTML Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/compiler/.git Step #2 - "srcmap": + GIT_DIR=/src/compiler Step #2 - "srcmap": + cd /src/compiler Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/withastro/compiler.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=71fb3ef7629c95f85a0cbe796d9052fe04a14a35 Step #2 - "srcmap": + jq_inplace /tmp/filemVSTML '."/src/compiler" = { type: "git", url: "https://github.com/withastro/compiler.git", rev: "71fb3ef7629c95f85a0cbe796d9052fe04a14a35" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file0iQ4Pb Step #2 - "srcmap": + cat /tmp/filemVSTML Step #2 - "srcmap": + jq '."/src/compiler" = { type: "git", url: "https://github.com/withastro/compiler.git", rev: "71fb3ef7629c95f85a0cbe796d9052fe04a14a35" }' Step #2 - "srcmap": + mv /tmp/file0iQ4Pb /tmp/filemVSTML Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filemVSTML Step #2 - "srcmap": + rm /tmp/filemVSTML Step #2 - "srcmap": { Step #2 - "srcmap": "/src/compiler": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/withastro/compiler.git", Step #2 - "srcmap": "rev": "71fb3ef7629c95f85a0cbe796d9052fe04a14a35" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package transform\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/norunners/vert v0.0.0-20221203075838-106a353d42dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.0.0-20221004154528-8021a29435af Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/iancoleman/strcase v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gkampitakis/go-snaps v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.5.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lithammer/dedent v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tdewolff/parse/v2 v2.6.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.0.0-20221010170243-090e33056c14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tdewolff/test v1.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gkampitakis/go-diff v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gkampitakis/ciinfo v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/pretty v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/sjson v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/maruel/natural v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/gjson v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tidwall/match v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: finding module for package github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: found github.com/AdamKorcz/go-118-fuzz-build/testing in github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": + go get -u github.com/AdamKorcz/go-118-fuzz-build/testing Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: upgraded github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 => v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/compiler/internal/transform FuzzScopeHTML fuzz_scope_html Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer /src/compiler/internal/transform FuzzTransformScoping fuzz_transform_scoping Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 160496dfdc1e: Already exists Step #4: e2c1e6ffb55e: Already exists Step #4: 4ff5c6df21dc: Pulling fs layer Step #4: 9c40b4b6ab93: Pulling fs layer Step #4: 3a41f07f0f5e: Pulling fs layer Step #4: f2eebf95c256: Pulling fs layer Step #4: 51b6805f931b: Pulling fs layer Step #4: f14d762ddb18: Pulling fs layer Step #4: 824e3821d370: Pulling fs layer Step #4: b060a849310f: Pulling fs layer Step #4: 8c6f96c778be: Pulling fs layer Step #4: ea2656352539: Pulling fs layer Step #4: a4eac7fd5a70: Pulling fs layer Step #4: 9397d40d87fe: Pulling fs layer Step #4: 7f1d39d824ad: Pulling fs layer Step #4: 1291d71657d7: Pulling fs layer Step #4: 6b2fa2f75a10: Pulling fs layer Step #4: 181f037809f9: Pulling fs layer Step #4: 57b88e43bdf2: Pulling fs layer Step #4: f14d762ddb18: Waiting Step #4: 7f1d39d824ad: Waiting Step #4: 1291d71657d7: Waiting Step #4: 6b2fa2f75a10: Waiting Step #4: 181f037809f9: Waiting Step #4: 824e3821d370: Waiting Step #4: 57b88e43bdf2: Waiting Step #4: b060a849310f: Waiting Step #4: a4eac7fd5a70: Waiting Step #4: 9397d40d87fe: Waiting Step #4: 8c6f96c778be: Waiting Step #4: ea2656352539: Waiting Step #4: f2eebf95c256: Waiting Step #4: 51b6805f931b: Waiting Step #4: 3a41f07f0f5e: Verifying Checksum Step #4: 3a41f07f0f5e: Download complete Step #4: 4ff5c6df21dc: Verifying Checksum Step #4: 4ff5c6df21dc: Download complete Step #4: 9c40b4b6ab93: Verifying Checksum Step #4: 9c40b4b6ab93: Download complete Step #4: 4ff5c6df21dc: Pull complete Step #4: 51b6805f931b: Verifying Checksum Step #4: 51b6805f931b: Download complete Step #4: f14d762ddb18: Verifying Checksum Step #4: f14d762ddb18: Download complete Step #4: 824e3821d370: Download complete Step #4: 9c40b4b6ab93: Pull complete Step #4: 3a41f07f0f5e: Pull complete Step #4: 8c6f96c778be: Download complete Step #4: b060a849310f: Verifying Checksum Step #4: b060a849310f: Download complete Step #4: a4eac7fd5a70: Verifying Checksum Step #4: a4eac7fd5a70: Download complete Step #4: f2eebf95c256: Verifying Checksum Step #4: f2eebf95c256: Download complete Step #4: 9397d40d87fe: Verifying Checksum Step #4: 9397d40d87fe: Download complete Step #4: 7f1d39d824ad: Verifying Checksum Step #4: 7f1d39d824ad: Download complete Step #4: 6b2fa2f75a10: Verifying Checksum Step #4: 6b2fa2f75a10: Download complete Step #4: 1291d71657d7: Verifying Checksum Step #4: 1291d71657d7: Download complete Step #4: ea2656352539: Verifying Checksum Step #4: ea2656352539: Download complete Step #4: 181f037809f9: Verifying Checksum Step #4: 181f037809f9: Download complete Step #4: 57b88e43bdf2: Download complete Step #4: f2eebf95c256: Pull complete Step #4: 51b6805f931b: Pull complete Step #4: f14d762ddb18: Pull complete Step #4: 824e3821d370: Pull complete Step #4: b060a849310f: Pull complete Step #4: 8c6f96c778be: Pull complete Step #4: ea2656352539: Pull complete Step #4: a4eac7fd5a70: Pull complete Step #4: 9397d40d87fe: Pull complete Step #4: 7f1d39d824ad: Pull complete Step #4: 1291d71657d7: Pull complete Step #4: 6b2fa2f75a10: Pull complete Step #4: 181f037809f9: Pull complete Step #4: 57b88e43bdf2: Pull complete Step #4: Digest: sha256:406489e5f3b0d7944f100a946fa06474c8c5e465f080ce17c1b734b13d81a16c Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target fuzz_transform_scoping Step #5: Running go target fuzz_scope_html Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2024/10/30 06:28:37 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2024/10/30 06:28:37 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/120.7 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 59.2 KiB/120.7 KiB] 49% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 59.2 KiB/120.7 KiB] 49% Done / [1/3 files][120.7 KiB/120.7 KiB] 99% Done / [2/3 files][120.7 KiB/120.7 KiB] 99% Done / [3/3 files][120.7 KiB/120.7 KiB] 100% Done Step #7: Operation completed over 3 objects/120.7 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_scope_html.json [Content-Type=application/json]... Step #9: / [0/3 files][ 0.0 B/ 4.6 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_transform_scoping.json [Content-Type=application/json]... Step #9: / [0/3 files][ 2.3 KiB/ 4.6 KiB] 49% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [0/3 files][ 2.3 KiB/ 4.6 KiB] 49% Done / [1/3 files][ 4.6 KiB/ 4.6 KiB] 99% Done / [2/3 files][ 4.6 KiB/ 4.6 KiB] 99% Done / [3/3 files][ 4.6 KiB/ 4.6 KiB] 100% Done Step #9: Operation completed over 3 objects/4.6 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_transform_scoping.log [Content-Type=application/octet-stream]... Step #11: / [0/2 files][ 0.0 B/ 946.0 B] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_scope_html.log [Content-Type=application/octet-stream]... Step #11: / [0/2 files][ 0.0 B/ 946.0 B] 0% Done / [1/2 files][ 946.0 B/ 946.0 B] 99% Done / [2/2 files][ 946.0 B/ 946.0 B] 100% Done Step #11: Operation completed over 2 objects/946.0 B. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Step #12: ***** NOTICE ***** Step #12: Step #12: Official `cloud-sdk` images, including multiple tagged versions across multiple Step #12: platforms, can be found at Step #12: https://github.com/GoogleCloudPlatform/cloud-sdk-docker. Step #12: Step #12: Suggested alternative images include: Step #12: Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:alpine Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:debian_component_based Step #12: gcr.io/google.com/cloudsdktool/cloud-sdk:slim Step #12: Step #12: Please note that the `gsutil` entrypoint must be specified when using these Step #12: images. Step #12: Step #12: ***** END OF NOTICE ***** Step #12: Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 158.0 B] / [1 files][ 158.0 B/ 158.0 B] Step #12: Operation completed over 1 objects/158.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: Step #13: ***** NOTICE ***** Step #13: Step #13: Supported `curl` versions can be found in the various images available at Step #13: https://console.cloud.google.com/launcher/details/google/ubuntu1604. Step #13: Step #13: ***** END OF NOTICE ***** Step #13: Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 330 0 0 100 330 0 1641 --:--:-- --:--:-- --:--:-- 1650 Finished Step #13 PUSH DONE