starting build "ff9853f7-2427-4ac4-b8fe-d75541fdb5e0" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee" Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Sending build context to Docker daemon 6.144kB Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go:ubuntu-24-04 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ubuntu-24-04: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 76249c7cd503: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6f31e6def6: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": a2b582eae4ea: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 7028eb4e2dcf: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": d72364a63d2c: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 433c5b64328b: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0cd001567fe3: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5400a81ed02a: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dc4dad7851b1: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 74981dba003a: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6fa4bd51f9: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9415c194fc97: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bbdf00a02de8: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dbfa123ad3e7: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1012b804b4e1: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 791f7502e992: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 976e217d2a3f: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 13736b10fcff: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f8560f828f5b: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 665d30606078: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": beea73e48ff0: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8a5dab8fbd81: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8d19d6533203: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3533b6430091: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": caec01f4a9dd: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bd2b2c05639b: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ce578df7167f: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": b83b7501bcbc: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 52c92ad2c63a: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 11543bd66340: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 03ebe7af6406: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f2dd995edee2: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0de6749e96dc: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 57eb6b40c436: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 59c6ea3e00b3: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3940beee3bea: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bbdf00a02de8: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 13736b10fcff: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dbfa123ad3e7: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f8560f828f5b: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dc4dad7851b1: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 791f7502e992: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1012b804b4e1: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 976e217d2a3f: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 665d30606078: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6fa4bd51f9: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": beea73e48ff0: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 74981dba003a: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8d19d6533203: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": caec01f4a9dd: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ce578df7167f: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0de6749e96dc: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 11543bd66340: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 57eb6b40c436: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 59c6ea3e00b3: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 03ebe7af6406: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f2dd995edee2: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bd2b2c05639b: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8a5dab8fbd81: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 52c92ad2c63a: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9415c194fc97: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3533b6430091: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3940beee3bea: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1137e9ba5e5f: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f4443c76981e: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5a417a17e48b: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5b9aad2b9e57: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9bbd10896e24: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ff25d580373a: Pulling fs layer Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5a417a17e48b: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5b9aad2b9e57: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f4443c76981e: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1137e9ba5e5f: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ff25d580373a: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9bbd10896e24: Waiting Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": d72364a63d2c: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": d72364a63d2c: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": a2b582eae4ea: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": a2b582eae4ea: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 433c5b64328b: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 433c5b64328b: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5400a81ed02a: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5400a81ed02a: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dc4dad7851b1: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 76249c7cd503: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 76249c7cd503: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 7028eb4e2dcf: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9415c194fc97: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9415c194fc97: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bbdf00a02de8: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bbdf00a02de8: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dbfa123ad3e7: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dbfa123ad3e7: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1012b804b4e1: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1012b804b4e1: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 791f7502e992: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 791f7502e992: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6fa4bd51f9: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6fa4bd51f9: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 976e217d2a3f: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 976e217d2a3f: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6f31e6def6: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6f31e6def6: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f8560f828f5b: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f8560f828f5b: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 13736b10fcff: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 665d30606078: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 665d30606078: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": beea73e48ff0: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": beea73e48ff0: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8d19d6533203: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8d19d6533203: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8a5dab8fbd81: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8a5dab8fbd81: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": caec01f4a9dd: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": caec01f4a9dd: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3533b6430091: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3533b6430091: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bd2b2c05639b: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bd2b2c05639b: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ce578df7167f: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 76249c7cd503: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 52c92ad2c63a: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 52c92ad2c63a: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": b83b7501bcbc: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 11543bd66340: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 11543bd66340: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 03ebe7af6406: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 03ebe7af6406: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f2dd995edee2: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 59c6ea3e00b3: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 59c6ea3e00b3: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3940beee3bea: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3940beee3bea: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1137e9ba5e5f: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1137e9ba5e5f: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0de6749e96dc: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0de6749e96dc: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 57eb6b40c436: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 57eb6b40c436: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f4443c76981e: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f4443c76981e: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 74981dba003a: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 74981dba003a: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5b9aad2b9e57: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5a417a17e48b: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5a417a17e48b: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ff25d580373a: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ff25d580373a: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0cd001567fe3: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0cd001567fe3: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9bbd10896e24: Verifying Checksum Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9bbd10896e24: Download complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6f31e6def6: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": a2b582eae4ea: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 7028eb4e2dcf: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": d72364a63d2c: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 433c5b64328b: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0cd001567fe3: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5400a81ed02a: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dc4dad7851b1: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 74981dba003a: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 2e6fa4bd51f9: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9415c194fc97: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bbdf00a02de8: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": dbfa123ad3e7: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1012b804b4e1: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 791f7502e992: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 976e217d2a3f: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 13736b10fcff: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f8560f828f5b: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 665d30606078: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": beea73e48ff0: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8a5dab8fbd81: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 8d19d6533203: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3533b6430091: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": caec01f4a9dd: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": bd2b2c05639b: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ce578df7167f: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": b83b7501bcbc: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 52c92ad2c63a: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 11543bd66340: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 03ebe7af6406: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f2dd995edee2: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 0de6749e96dc: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 57eb6b40c436: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 59c6ea3e00b3: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 3940beee3bea: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 1137e9ba5e5f: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": f4443c76981e: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5a417a17e48b: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 5b9aad2b9e57: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": 9bbd10896e24: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ff25d580373a: Pull complete Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Digest: sha256:a58d392c7131ed3842a9b594ba772b8e6f9124d796822c616bdd7e9ceb4690ab Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:ubuntu-24-04 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> 7c49d33c67a2 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 2/6 : RUN git clone --depth 1 https://github.com/istio/istio Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> Running in bde306614353 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Cloning into 'istio'... Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Removing intermediate container bde306614353 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> 8cbd2f6dcaca Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 3/6 : RUN git clone --depth 1 --branch oss-fuzz-build-ref https://github.com/AdamKorcz/istio $SRC/temp-istio Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> Running in 05b70525fea9 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Cloning into '/src/temp-istio'... Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Removing intermediate container 05b70525fea9 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> 090dcda310f8 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 4/6 : RUN git clone --depth 1 https://github.com/AdamKorcz/go-118-fuzz-build --branch=v2_2 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> Running in 65d48bfba6bc Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Cloning into 'go-118-fuzz-build'... Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Removing intermediate container 65d48bfba6bc Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> 5406344443b4 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> 79936caf51eb Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Step 6/6 : WORKDIR $SRC/istio Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> Running in 44676eb10a51 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Removing intermediate container 44676eb10a51 Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": ---> d9c86cf72b5b Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Successfully built d9c86cf72b5b Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Successfully tagged gcr.io/oss-fuzz/istio:latest Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/istio:latest Finished Step #1 - "build-2e8708d2-7a06-4fba-9bfb-6c577fe67bee" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/istio Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + SRCMAP=/tmp/filehI25lh Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/go-118-fuzz-build/.git Step #2 - "srcmap": + GIT_DIR=/src/go-118-fuzz-build Step #2 - "srcmap": + cd /src/go-118-fuzz-build Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/go-118-fuzz-build Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=65072595fdfb80eaedbc37db3837d82eb95ce7b2 Step #2 - "srcmap": + jq_inplace /tmp/filehI25lh '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/fileofgVsD Step #2 - "srcmap": + cat /tmp/filehI25lh Step #2 - "srcmap": + jq '."/src/go-118-fuzz-build" = { type: "git", url: "https://github.com/AdamKorcz/go-118-fuzz-build", rev: "65072595fdfb80eaedbc37db3837d82eb95ce7b2" }' Step #2 - "srcmap": + mv /tmp/fileofgVsD /tmp/filehI25lh Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/temp-istio/.git Step #2 - "srcmap": + GIT_DIR=/src/temp-istio Step #2 - "srcmap": + cd /src/temp-istio Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/istio Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=11fffb5d1662da620868bf38513cb8717996aca8 Step #2 - "srcmap": + jq_inplace /tmp/filehI25lh '."/src/temp-istio" = { type: "git", url: "https://github.com/AdamKorcz/istio", rev: "11fffb5d1662da620868bf38513cb8717996aca8" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/fileBEcq5S Step #2 - "srcmap": + cat /tmp/filehI25lh Step #2 - "srcmap": + jq '."/src/temp-istio" = { type: "git", url: "https://github.com/AdamKorcz/istio", rev: "11fffb5d1662da620868bf38513cb8717996aca8" }' Step #2 - "srcmap": + mv /tmp/fileBEcq5S /tmp/filehI25lh Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/istio/.git Step #2 - "srcmap": + GIT_DIR=/src/istio Step #2 - "srcmap": + cd /src/istio Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/istio/istio Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=eab5fb0686458842f328ff53f0d985ec1fa6df5e Step #2 - "srcmap": + jq_inplace /tmp/filehI25lh '."/src/istio" = { type: "git", url: "https://github.com/istio/istio", rev: "eab5fb0686458842f328ff53f0d985ec1fa6df5e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/file2iPFUd Step #2 - "srcmap": + cat /tmp/filehI25lh Step #2 - "srcmap": + jq '."/src/istio" = { type: "git", url: "https://github.com/istio/istio", rev: "eab5fb0686458842f328ff53f0d985ec1fa6df5e" }' Step #2 - "srcmap": + mv /tmp/file2iPFUd /tmp/filehI25lh Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filehI25lh Step #2 - "srcmap": + rm /tmp/filehI25lh Step #2 - "srcmap": { Step #2 - "srcmap": "/src/go-118-fuzz-build": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/go-118-fuzz-build", Step #2 - "srcmap": "rev": "65072595fdfb80eaedbc37db3837d82eb95ce7b2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/temp-istio": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/istio", Step #2 - "srcmap": "rev": "11fffb5d1662da620868bf38513cb8717996aca8" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/istio": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/istio/istio", Step #2 - "srcmap": "rev": "eab5fb0686458842f328ff53f0d985ec1fa6df5e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go build Step #3 - "compile-libfuzzer-coverage-x86_64": + mv go-118-fuzz-build /root/go/bin/go-118-fuzz-build_v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd cmd/convertLibFuzzerTestcaseToStdLibGo Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/convertLibFuzzerTestcaseToStdLibGo /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go build . Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smacker/go-tree-sitter v0.0.0-20240827094217-dd81d9e9be82 Step #3 - "compile-libfuzzer-coverage-x86_64": + mv convertLibFuzzerTestcaseToStdLibGo /root/go/bin/ Step #3 - "compile-libfuzzer-coverage-x86_64": + popd Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + pushd cmd/addStdLibCorpusToFuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build/cmd/addStdLibCorpusToFuzzer /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + go build . Step #3 - "compile-libfuzzer-coverage-x86_64": + mv addStdLibCorpusToFuzzer /root/go/bin/ Step #3 - "compile-libfuzzer-coverage-x86_64": + popd Step #3 - "compile-libfuzzer-coverage-x86_64": /src/go-118-fuzz-build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/istio Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/temp-istio/tests/fuzz/oss_fuzz_build.sh /src/istio/tests/fuzz/ Step #3 - "compile-libfuzzer-coverage-x86_64": + '[' -n '' ']' Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/istio/tests/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pkg/config/validation/openapi_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pkg/config/mesh/mesh_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/addressmap_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/cluster_local_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/config_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/conversion_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/context_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/network_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/model/proxy_view_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/networking/core/gateway_simulation_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/networking/core/sidecar_simulation_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/networking/core/peer_authentication_simulation_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm pilot/pkg/networking/core/serviceentry_simulation_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/security/pkg/pki/ra ValidateCSR ValidateCSR Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading istio.io/api v1.29.0-alpha.0.0.20260116183115-1e525da7e1ce Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.78.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cobra v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/zap v1.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/atomic v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/gateway-api v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/prometheus v0.59.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading istio.io/client-go v1.29.0-alpha.0.0.20260116183715-e1c544fe5cee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiextensions-apiserver v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/gateway-api-inference-extension v0.0.0-20250926182816-0a3bb2010751 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/multierr v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.66.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20251213004720-97cd9d5aeac2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20251219084037-98d557b7f1e7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20251125145642-4e65d59e963e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/mcs-api v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/otlptranslator v0.0.0-20250717125610-8549f4ab4f8f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20251213004720-97cd9d5aeac2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/envoy v1.36.1-0.20260117034604-3a80eae751cf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gregjones/httpcache v0.0.0-20190611155906-901d90724c79 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/peterbourgon/diskv v2.0.1+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20251110193048-8bfbf64dc13e Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/sprig/v3 v3.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/cel-go v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/jwx v1.2.31 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grafana/regexp v0.0.0-20240518133315-a468a5bfb3bc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/btree v1.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/contrib v1.36.1-0.20260117034604-3a80eae751cf Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/goutils v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/huandu/xstrings v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/copystructure v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/shopspring/decimal v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/cast v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.46.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/backoff/v2 v2.0.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/blackmagic v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/httpcc v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/option v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lestrrat-go/iter v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cel.dev/expr v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.21.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stoewer/go-strcase v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/antlr4-go/antlr/v4 v4.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mitchellh/reflectwalk v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.22.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/yamlutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/cmdutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/stringutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/netutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/conv v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/fileutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/jsonutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/mangling v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/jsonname v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/typeutils v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/loading v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20251017212417-90e834f514db Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func ValidateCSR(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/security/pkg/pki/ca FuzzIstioCASign FuzzIstioCASign Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzIstioCASign" -> [[]byte []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/security/pkg/server/ca FuzzCreateCertificate FuzzCreateCertificate Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzCreateCertificate" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/security/pkg/server/ca/authenticate FuzzBuildSecurityCaller FuzzBuildSecurityCaller Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildSecurityCaller" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/security/pkg/k8s/chiron FuzzReadCACert FuzzReadCACert Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzReadCACert" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pkg/config/validation FuzzValidateHeaderValue FuzzValidateHeaderValue Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzValidateHeaderValue" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pkg/config/mesh FuzzValidateMeshConfig FuzzValidateMeshConfig Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzValidateMeshConfig" -> [string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pkg/bootstrap FuzzWriteTo FuzzWriteTo Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzWriteTo" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pkg/kube/inject FuzzRunTemplate FuzzRunTemplate Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzRunTemplate" -> [[]byte string] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/security/authz/builder FuzzBuildHTTP FuzzBuildHTTP Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildHTTP" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/security/authz/builder FuzzBuildTCP FuzzBuildTCP Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildTCP" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/model FuzzDeepCopyService FuzzDeepCopyService Step #3 - "compile-libfuzzer-coverage-x86_64": Could not find the function: func FuzzDeepCopyService(f *testing.F) Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/model FuzzDeepCopyServiceInstance FuzzDeepCopyServiceInstance Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDeepCopyServiceInstance" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/model FuzzDeepCopyWorkloadInstance FuzzDeepCopyWorkloadInstance Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDeepCopyWorkloadInstance" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/model FuzzDeepCopyIstioEndpoint FuzzDeepCopyIstioEndpoint Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzDeepCopyIstioEndpoint" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/util FuzzShallowCopyTrafficPolicy FuzzShallowCopyTrafficPolicy Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzShallowCopyTrafficPolicy" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/util FuzzShallowCopyPortTrafficPolicy FuzzShallowCopyPortTrafficPolicy Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzShallowCopyPortTrafficPolicy" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/util FuzzMergeTrafficPolicy FuzzMergeTrafficPolicy Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzMergeTrafficPolicy" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/core/loadbalancer FuzzApplyLocalityLBSetting FuzzApplyLocalityLBSetting Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzApplyLocalityLBSetting" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/core/envoyfilter FuzzApplyClusterMerge FuzzApplyClusterMerge Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzApplyClusterMerge" -> [int string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/core FuzzBuildGatewayListeners FuzzBuildGatewayListeners Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildGatewayListeners" -> [int string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/core FuzzBuildSidecarOutboundHTTPRouteConfig FuzzBuildSidecarOutboundHTTPRouteConfig Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildSidecarOutboundHTTPRouteConfig" -> [int string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/networking/core FuzzBuildSidecarOutboundListeners FuzzBuildSidecarOutboundListeners Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzBuildSidecarOutboundListeners" -> [int string []byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer_v2 istio.io/istio/pilot/pkg/serviceregistry/kube/controller FuzzKubeController FuzzKubeController Step #3 - "compile-libfuzzer-coverage-x86_64": Saved "FuzzKubeController" -> [[]byte] into /workspace/out/libfuzzer-coverage-x86_64/fuzzer-parameters.json Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzCRDRoundtrip fuzz_crd_roundtrip Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/inconshreveable/mousetrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/zapr v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/goccy/go-json v0.10.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.27.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/lithammer/dedent v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/evanphx/json-patch v5.9.11+incompatible Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mwitkow/go-conntrack v0.0.0-20190716064945-2f068394615f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gotest.tools/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/testify/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sergi/go-diff v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/dlclark/regexp2 v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gonum.org/v1/gonum v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/units v0.0.0-20240927000941-0f3dac36c52b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/sigv4 v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/testify/enable/yaml/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag/jsonutils/fixtures_test v0.25.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/creack/pty v1.1.18 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/mock v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/api v0.239.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.10.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/go-ansiterm v0.0.0-20250102033503-faa5f7b0171c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/assert/v2 v2.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/alecthomas/repr v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jpillora/backoff v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/pkg/v3 v3.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/client/v3 v3.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/etcd/api/v3 v3.6.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2 v1.36.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/config v1.29.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/credentials v1.17.67 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sts v1.33.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hexops/gotextdiff v1.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/go-control-plane/ratelimit v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-semver v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/browser v0.0.0-20240102092130-5ac0b6a4141c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang-jwt/jwt/v5 v5.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/smithy-go v1.22.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.12.15 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/ini v1.8.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.30 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/sso v1.25.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/service/ssooidc v1.30.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.34 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth v0.16.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/auth/oauth2adapt v0.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/s2a-go v0.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/enterprise-certificate-proxy v0.3.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/googleapis/gax-go/v2 v2.14.2 Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzExtractIDs fuzz_extract_ids Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzPemCertBytestoString fuzz_pem_cert_bytes_to_string Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzParsePemEncodedCertificateChain fuzz_parse_pem_encoded_certificate_chain Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzUpdateVerifiedKeyCertBundleFromFile fuzz_update_verified_cert_bundle_from_file Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzJwtUtil fuzz_jwt_util Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzVerifyCertificate fuzz_verify_certificate Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzFindRootCertFromCertificateChainBytes fuzz_find_root_cert_from_certificate_chain_bytes Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzAggregateController fuzz_aggregate_controller Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzKubeCRD fuzz_kube_crd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzWE fuzz_workload_entry Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzConfigValidation3 fuzz_config_validation_3 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzCidrRange fuzz_cidr_range Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzHeaderMatcher fuzz_header_matcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzHostMatcher fuzz_host_matcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzMetadataListMatcher fuzz_metadata_list_matcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzGrpcGenGenerate fuzz_grpc_gen_generate Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzParseInputs fuzz_parse_inputs Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzConfigValidation fuzz_config_validation Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzConfigValidation2 fuzz_config_validation2 Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzParseMeshNetworks fuzz_parse_mesh_networks Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzValidateMeshConfig fuzz_validate_mesh_config Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzInitContext fuzz_init_context Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzAnalyzer fuzz_analyzer Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzXds fuzz_xds Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzCompareDiff fuzz_compare_diff Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzIntoResourceFile fuzz_into_resource_file Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzBNMUnmarshalJSON fuzz_bnm_unmarshal_json Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzValidateClusters fuzz_validate_clusters Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzGalleyDiag fuzz_galley_diag Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzNewBootstrapServer fuzz_new_bootstrap_server Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzGenCSR fuzz_gen_csr Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer istio.io/istio/tests/fuzz FuzzCreateCertE2EUsingClientCertAuthenticator fuzz_create_cert_e2e_using_client_cert_authenticator Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 32: cd: /root/go/src/istio.io/istio/tests/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": istio.io/istio/tests/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + zip /workspace/out/libfuzzer-coverage-x86_64/fuzz_config_validation2_seed_corpus.zip /src/istio/tests/fuzz/testdata/FuzzConfigValidation2/seed1 Step #3 - "compile-libfuzzer-coverage-x86_64": adding: src/istio/tests/fuzz/testdata/FuzzConfigValidation2/seed1 (deflated 18%) Step #3 - "compile-libfuzzer-coverage-x86_64": + zip /workspace/out/libfuzzer-coverage-x86_64/fuzz_into_resource_file_seed_corpus.zip ./pkg/kube/inject/testdata/inject/auth.non-default-service-account.yaml ./pkg/kube/inject/testdata/inject/auth.yaml ./pkg/kube/inject/testdata/inject/cronjob.yaml ./pkg/kube/inject/testdata/inject/custom-template.iop.yaml ./pkg/kube/inject/testdata/inject/custom-template.yaml ./pkg/kube/inject/testdata/inject/daemonset.yaml ./pkg/kube/inject/testdata/inject/deploymentconfig-multi.yaml ./pkg/kube/inject/testdata/inject/deploymentconfig-with-canonical-service-label.yaml ./pkg/kube/inject/testdata/inject/deploymentconfig.yaml ./pkg/kube/inject/testdata/inject/enable-core-dump.yaml ./pkg/kube/inject/testdata/inject/explicit-security-context.yaml ./pkg/kube/inject/testdata/inject/format-duration.yaml ./pkg/kube/inject/testdata/inject/frontend.yaml ./pkg/kube/inject/testdata/inject/gateway-spire.yaml ./pkg/kube/inject/testdata/inject/gateway-with-default-container.yaml ./pkg/kube/inject/testdata/inject/gateway.yaml ./pkg/kube/inject/testdata/inject/grpc-agent.yaml ./pkg/kube/inject/testdata/inject/grpc-simple.yaml ./pkg/kube/inject/testdata/inject/hello-existing-cncf-networks-json.yaml ./pkg/kube/inject/testdata/inject/hello-existing-cncf-networks.yaml ./pkg/kube/inject/testdata/inject/hello-host-network-with-ns.yaml ./pkg/kube/inject/testdata/inject/hello-host-network.yaml ./pkg/kube/inject/testdata/inject/hello-ignore.yaml ./pkg/kube/inject/testdata/inject/hello-image-pull-secret.yaml ./pkg/kube/inject/testdata/inject/hello-image-secrets-in-values.iop.yaml ./pkg/kube/inject/testdata/inject/hello-mtls-not-ready.yaml ./pkg/kube/inject/testdata/inject/hello-multi.yaml ./pkg/kube/inject/testdata/inject/hello-namespace.yaml ./pkg/kube/inject/testdata/inject/hello-openshift-custom-injection.yaml ./pkg/kube/inject/testdata/inject/hello-openshift-tproxy.yaml ./pkg/kube/inject/testdata/inject/hello-openshift.yaml ./pkg/kube/inject/testdata/inject/hello-probes-localhost.yaml ./pkg/kube/inject/testdata/inject/hello-probes-noProxyHoldApplication-ProxyConfig.yaml ./pkg/kube/inject/testdata/inject/hello-probes-proxyHoldApplication-ProxyConfig.yaml ./pkg/kube/inject/testdata/inject/hello-probes-with-flag-set-in-annotation.yaml ./pkg/kube/inject/testdata/inject/hello-probes-with-flag-unset-in-annotation.yaml ./pkg/kube/inject/testdata/inject/hello-probes.yaml ./pkg/kube/inject/testdata/inject/hello-proxy-override.yaml ./pkg/kube/inject/testdata/inject/hello-readiness.yaml ./pkg/kube/inject/testdata/inject/hello-service.yaml ./pkg/kube/inject/testdata/inject/hello-template-in-values.iop.yaml ./pkg/kube/inject/testdata/inject/hello-tracing-disabled.yaml ./pkg/kube/inject/testdata/inject/hello.yaml ./pkg/kube/inject/testdata/inject/https-probes.yaml ./pkg/kube/inject/testdata/inject/init-no-intercept-no-native-sidecar.yaml ./pkg/kube/inject/testdata/inject/job.yaml ./pkg/kube/inject/testdata/inject/kubevirtInterfaces.yaml ./pkg/kube/inject/testdata/inject/kubevirtInterfaces_list.yaml ./pkg/kube/inject/testdata/inject/list-frontend.yaml ./pkg/kube/inject/testdata/inject/list.yaml ./pkg/kube/inject/testdata/inject/merge-probers.yaml ./pkg/kube/inject/testdata/inject/multi-container.yaml ./pkg/kube/inject/testdata/inject/multi-init.yaml ./pkg/kube/inject/testdata/inject/multiple-templates.yaml ./pkg/kube/inject/testdata/inject/named_port.yaml ./pkg/kube/inject/testdata/inject/native-sidecar-opt-in.yaml ./pkg/kube/inject/testdata/inject/native-sidecar-opt-out.yaml ./pkg/kube/inject/testdata/inject/native-sidecar.yaml ./pkg/kube/inject/testdata/inject/one_container.yaml ./pkg/kube/inject/testdata/inject/only-proxy-container.yaml ./pkg/kube/inject/testdata/inject/pod.yaml ./pkg/kube/inject/testdata/inject/prometheus-scrape.yaml ./pkg/kube/inject/testdata/inject/prometheus-scrape2.yaml ./pkg/kube/inject/testdata/inject/proxy-override-args.yaml ./pkg/kube/inject/testdata/inject/proxy-override-runas.yaml ./pkg/kube/inject/testdata/inject/proxy-override.yaml ./pkg/kube/inject/testdata/inject/ready_live.yaml ./pkg/kube/inject/testdata/inject/ready_only.yaml ./pkg/kube/inject/testdata/inject/replicaset.yaml ./pkg/kube/inject/testdata/inject/replicationcontroller.yaml ./pkg/kube/inject/testdata/inject/reroute-virtual-interfaces.yaml ./pkg/kube/inject/testdata/inject/reroute-virtual-interfaces_list.yaml ./pkg/kube/inject/testdata/inject/resource_annotations.yaml ./pkg/kube/inject/testdata/inject/sidecar-spire.yaml ./pkg/kube/inject/testdata/inject/spire-template.iop.yaml ./pkg/kube/inject/testdata/inject/startup_live.yaml ./pkg/kube/inject/testdata/inject/startup_only.yaml ./pkg/kube/inject/testdata/inject/startup_ready_live.yaml ./pkg/kube/inject/testdata/inject/statefulset.yaml ./pkg/kube/inject/testdata/inject/status_annotations.yaml ./pkg/kube/inject/testdata/inject/status_annotations_zeroport.yaml ./pkg/kube/inject/testdata/inject/status_params.yaml ./pkg/kube/inject/testdata/inject/tcp-probes.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeinboundports.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeipranges.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeoutboundports.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-bad-includeinboundports.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-bad-includeipranges.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-empty-includes.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations-wildcards.yaml ./pkg/kube/inject/testdata/inject/traffic-annotations.yaml ./pkg/kube/inject/testdata/inject/traffic-params-empty-includes.yaml ./pkg/kube/inject/testdata/inject/traffic-params.yaml ./pkg/kube/inject/testdata/inject/truncate-canonical-name-custom-controller-pod.yaml ./pkg/kube/inject/testdata/inject/truncate-canonical-name-pod.yaml ./pkg/kube/inject/testdata/inject/two_container.yaml ./pkg/kube/inject/testdata/inject/user-volume.yaml Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/auth.non-default-service-account.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/auth.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/cronjob.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/custom-template.iop.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/custom-template.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/daemonset.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/deploymentconfig-multi.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/deploymentconfig-with-canonical-service-label.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/deploymentconfig.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/enable-core-dump.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/explicit-security-context.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/format-duration.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/frontend.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/gateway-spire.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/gateway-with-default-container.yaml (deflated 60%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/gateway.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/grpc-agent.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/grpc-simple.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-existing-cncf-networks-json.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-existing-cncf-networks.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-host-network-with-ns.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-host-network.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-ignore.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-image-pull-secret.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-image-secrets-in-values.iop.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-mtls-not-ready.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-multi.yaml (deflated 75%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-namespace.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-openshift-custom-injection.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-openshift-tproxy.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-openshift.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes-localhost.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes-noProxyHoldApplication-ProxyConfig.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes-proxyHoldApplication-ProxyConfig.yaml (deflated 65%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes-with-flag-set-in-annotation.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes-with-flag-unset-in-annotation.yaml (deflated 67%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-probes.yaml (deflated 70%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-proxy-override.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-readiness.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-service.yaml (deflated 29%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-template-in-values.iop.yaml (deflated 34%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello-tracing-disabled.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/hello.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/https-probes.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/init-no-intercept-no-native-sidecar.yaml (deflated 53%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/job.yaml (deflated 37%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/kubevirtInterfaces.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/kubevirtInterfaces_list.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/list-frontend.yaml (deflated 61%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/list.yaml (deflated 78%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/merge-probers.yaml (deflated 74%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/multi-container.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/multi-init.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/multiple-templates.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/named_port.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/native-sidecar-opt-in.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/native-sidecar-opt-out.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/native-sidecar.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/one_container.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/only-proxy-container.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/pod.yaml (deflated 38%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/prometheus-scrape.yaml (deflated 41%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/prometheus-scrape2.yaml (deflated 40%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/proxy-override-args.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/proxy-override-runas.yaml (deflated 46%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/proxy-override.yaml (deflated 59%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/ready_live.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/ready_only.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/replicaset.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/replicationcontroller.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/reroute-virtual-interfaces.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/reroute-virtual-interfaces_list.yaml (deflated 50%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/resource_annotations.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/sidecar-spire.yaml (deflated 51%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/spire-template.iop.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/startup_live.yaml (deflated 69%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/startup_only.yaml (deflated 54%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/startup_ready_live.yaml (deflated 72%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/statefulset.yaml (deflated 55%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/status_annotations.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/status_annotations_zeroport.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/status_params.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/tcp-probes.yaml (deflated 58%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeinboundports.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeipranges.yaml (deflated 47%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-bad-excludeoutboundports.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-bad-includeinboundports.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-bad-includeipranges.yaml (deflated 48%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-empty-includes.yaml (deflated 57%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations-wildcards.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-annotations.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-params-empty-includes.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/traffic-params.yaml (deflated 49%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/truncate-canonical-name-custom-controller-pod.yaml (deflated 52%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/truncate-canonical-name-pod.yaml (deflated 45%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/two_container.yaml (deflated 66%) Step #3 - "compile-libfuzzer-coverage-x86_64": adding: pkg/kube/inject/testdata/inject/user-volume.yaml (deflated 56%) Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/istio/tests/fuzz/testdata/FuzzConfigValidation2/fuzz_config_validation2.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/istio/tests/fuzz/testdata/inject/fuzz_into_resource_file.dict /workspace/out/libfuzzer-coverage-x86_64/ Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Pulling fs layer Step #4: fc957eac73fe: Pulling fs layer Step #4: 2cf09256a281: Pulling fs layer Step #4: 3fe6cdf04ee1: Pulling fs layer Step #4: 1084a2b49e83: Pulling fs layer Step #4: 31ba057ecf6d: Pulling fs layer Step #4: 59426ba5d39b: Pulling fs layer Step #4: 486a672539cd: Pulling fs layer Step #4: 02e6586ec68f: Pulling fs layer Step #4: 89f4f518033a: Pulling fs layer Step #4: 4cca2fca8880: Pulling fs layer Step #4: 8d2722b29f6b: Pulling fs layer Step #4: cf076a2f8659: Pulling fs layer Step #4: f27a4fa25382: Pulling fs layer Step #4: 289d5a850e7a: Pulling fs layer Step #4: 6905faba4c5f: Pulling fs layer Step #4: 09ab8394cd99: Pulling fs layer Step #4: d3c9fddcbd10: Pulling fs layer Step #4: 02876c5eb313: Pulling fs layer Step #4: c9d166fcb093: Pulling fs layer Step #4: b083a53f2f2e: Pulling fs layer Step #4: 79b7ad49bf4e: Pulling fs layer Step #4: 389037f84e56: Pulling fs layer Step #4: 59426ba5d39b: Waiting Step #4: f9cfba6d5c34: Pulling fs layer Step #4: 4c3801fdf5de: Pulling fs layer Step #4: 8d2722b29f6b: Waiting Step #4: f293e6beb519: Pulling fs layer Step #4: 480451de0980: Pulling fs layer Step #4: cf076a2f8659: Waiting Step #4: 486a672539cd: Waiting Step #4: 2942f6310072: Pulling fs layer Step #4: f27a4fa25382: Waiting Step #4: 4cca2fca8880: Waiting Step #4: 02e6586ec68f: Waiting Step #4: 79b7ad49bf4e: Waiting Step #4: 6905faba4c5f: Waiting Step #4: 289d5a850e7a: Waiting Step #4: f9cfba6d5c34: Waiting Step #4: 2942f6310072: Waiting Step #4: 02876c5eb313: Waiting Step #4: c9d166fcb093: Waiting Step #4: b083a53f2f2e: Waiting Step #4: d3c9fddcbd10: Waiting Step #4: 4c3801fdf5de: Waiting Step #4: f293e6beb519: Waiting Step #4: 480451de0980: Waiting Step #4: 89f4f518033a: Waiting Step #4: 31ba057ecf6d: Verifying Checksum Step #4: 31ba057ecf6d: Download complete Step #4: 2cf09256a281: Download complete Step #4: 3fe6cdf04ee1: Download complete Step #4: 1084a2b49e83: Verifying Checksum Step #4: 1084a2b49e83: Download complete Step #4: 486a672539cd: Verifying Checksum Step #4: 486a672539cd: Download complete Step #4: 59426ba5d39b: Verifying Checksum Step #4: 59426ba5d39b: Download complete Step #4: 89f4f518033a: Verifying Checksum Step #4: 89f4f518033a: Download complete Step #4: 4cca2fca8880: Verifying Checksum Step #4: 4cca2fca8880: Download complete Step #4: b549f31133a9: Verifying Checksum Step #4: b549f31133a9: Download complete Step #4: 8d2722b29f6b: Download complete Step #4: 289d5a850e7a: Download complete Step #4: f27a4fa25382: Verifying Checksum Step #4: f27a4fa25382: Download complete Step #4: 6905faba4c5f: Download complete Step #4: d3c9fddcbd10: Download complete Step #4: 02e6586ec68f: Verifying Checksum Step #4: 02e6586ec68f: Download complete Step #4: b083a53f2f2e: Download complete Step #4: c9d166fcb093: Verifying Checksum Step #4: c9d166fcb093: Download complete Step #4: cf076a2f8659: Download complete Step #4: fc957eac73fe: Verifying Checksum Step #4: fc957eac73fe: Download complete Step #4: f9cfba6d5c34: Verifying Checksum Step #4: f9cfba6d5c34: Download complete Step #4: 389037f84e56: Verifying Checksum Step #4: 389037f84e56: Download complete Step #4: 4c3801fdf5de: Verifying Checksum Step #4: 4c3801fdf5de: Download complete Step #4: f293e6beb519: Verifying Checksum Step #4: f293e6beb519: Download complete Step #4: 2942f6310072: Verifying Checksum Step #4: 2942f6310072: Download complete Step #4: b549f31133a9: Pull complete Step #4: 480451de0980: Verifying Checksum Step #4: 480451de0980: Download complete Step #4: 09ab8394cd99: Verifying Checksum Step #4: 09ab8394cd99: Download complete Step #4: 79b7ad49bf4e: Verifying Checksum Step #4: 79b7ad49bf4e: Download complete Step #4: 02876c5eb313: Verifying Checksum Step #4: 02876c5eb313: Download complete Step #4: fc957eac73fe: Pull complete Step #4: 2cf09256a281: Pull complete Step #4: 3fe6cdf04ee1: Pull complete Step #4: 1084a2b49e83: Pull complete Step #4: 31ba057ecf6d: Pull complete Step #4: 59426ba5d39b: Pull complete Step #4: 486a672539cd: Pull complete Step #4: 02e6586ec68f: Pull complete Step #4: 89f4f518033a: Pull complete Step #4: 4cca2fca8880: Pull complete Step #4: 8d2722b29f6b: Pull complete Step #4: cf076a2f8659: Pull complete Step #4: f27a4fa25382: Pull complete Step #4: 289d5a850e7a: Pull complete Step #4: 6905faba4c5f: Pull complete Step #4: 09ab8394cd99: Pull complete Step #4: d3c9fddcbd10: Pull complete Step #4: 02876c5eb313: Pull complete Step #4: c9d166fcb093: Pull complete Step #4: b083a53f2f2e: Pull complete Step #4: 79b7ad49bf4e: Pull complete Step #4: 389037f84e56: Pull complete Step #4: f9cfba6d5c34: Pull complete Step #4: 4c3801fdf5de: Pull complete Step #4: f293e6beb519: Pull complete Step #4: 480451de0980: Pull complete Step #4: 2942f6310072: Pull complete Step #4: Digest: sha256:de41e9cbf447415fe69227fd6c137fb099d7c0c30fa134d85c7a1d9c83c4cfd6 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Pulling image: gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: ubuntu-24-04: Pulling from oss-fuzz-base/base-runner Step #5: 76249c7cd503: Already exists Step #5: 2e6f31e6def6: Already exists Step #5: a2b582eae4ea: Already exists Step #5: b7b1ddd3f71a: Pulling fs layer Step #5: 2f364faa7f4e: Pulling fs layer Step #5: 8c557032b4bd: Pulling fs layer Step #5: dd3eaa7967f9: Pulling fs layer Step #5: 41d4e8e61eb4: Pulling fs layer Step #5: dc2a533a73a6: Pulling fs layer Step #5: eae6f7408e92: Pulling fs layer Step #5: 78ddb15730f0: Pulling fs layer Step #5: 8b68a38b3419: Pulling fs layer Step #5: ebaa4bfc6675: Pulling fs layer Step #5: ccb535e2aa4b: Pulling fs layer Step #5: aa54c54ac092: Pulling fs layer Step #5: eff346a16803: Pulling fs layer Step #5: 0d16c817421f: Pulling fs layer Step #5: ea996eb1b927: Pulling fs layer Step #5: 2aaf7982a1de: Pulling fs layer Step #5: 4409786150f8: Pulling fs layer Step #5: ea5eb927e900: Pulling fs layer Step #5: cbc7fe6dfb6c: Pulling fs layer Step #5: 65abf2f5069a: Pulling fs layer Step #5: fd7d779a89a3: Pulling fs layer Step #5: 051ffcbd7a8d: Pulling fs layer Step #5: aa113770f1c5: Pulling fs layer Step #5: c661988ba1db: Pulling fs layer Step #5: 4ae5c2251568: Pulling fs layer Step #5: eae6f7408e92: Waiting Step #5: 2aaf7982a1de: Waiting Step #5: 4409786150f8: Waiting Step #5: ea5eb927e900: Waiting Step #5: cbc7fe6dfb6c: Waiting Step #5: 65abf2f5069a: Waiting Step #5: 78ddb15730f0: Waiting Step #5: 8b68a38b3419: Waiting Step #5: ebaa4bfc6675: Waiting Step #5: ccb535e2aa4b: Waiting Step #5: fd7d779a89a3: Waiting Step #5: aa54c54ac092: Waiting Step #5: 051ffcbd7a8d: Waiting Step #5: aa113770f1c5: Waiting Step #5: eff346a16803: Waiting Step #5: c661988ba1db: Waiting Step #5: 4ae5c2251568: Waiting Step #5: 0d16c817421f: Waiting Step #5: ea996eb1b927: Waiting Step #5: 41d4e8e61eb4: Verifying Checksum Step #5: 41d4e8e61eb4: Download complete Step #5: 8c557032b4bd: Verifying Checksum Step #5: 8c557032b4bd: Download complete Step #5: b7b1ddd3f71a: Verifying Checksum Step #5: b7b1ddd3f71a: Download complete Step #5: dd3eaa7967f9: Verifying Checksum Step #5: dd3eaa7967f9: Download complete Step #5: 2f364faa7f4e: Verifying Checksum Step #5: 2f364faa7f4e: Download complete Step #5: 78ddb15730f0: Verifying Checksum Step #5: 78ddb15730f0: Download complete Step #5: eae6f7408e92: Download complete Step #5: 8b68a38b3419: Download complete Step #5: b7b1ddd3f71a: Pull complete Step #5: aa54c54ac092: Verifying Checksum Step #5: aa54c54ac092: Download complete Step #5: eff346a16803: Download complete Step #5: ccb535e2aa4b: Verifying Checksum Step #5: ccb535e2aa4b: Download complete Step #5: ea996eb1b927: Verifying Checksum Step #5: ea996eb1b927: Download complete Step #5: dc2a533a73a6: Verifying Checksum Step #5: dc2a533a73a6: Download complete Step #5: 2f364faa7f4e: Pull complete Step #5: 4409786150f8: Download complete Step #5: ea5eb927e900: Verifying Checksum Step #5: ea5eb927e900: Download complete Step #5: 8c557032b4bd: Pull complete Step #5: ebaa4bfc6675: Verifying Checksum Step #5: ebaa4bfc6675: Download complete Step #5: fd7d779a89a3: Verifying Checksum Step #5: fd7d779a89a3: Download complete Step #5: 65abf2f5069a: Verifying Checksum Step #5: 65abf2f5069a: Download complete Step #5: aa113770f1c5: Verifying Checksum Step #5: aa113770f1c5: Download complete Step #5: dd3eaa7967f9: Pull complete Step #5: 051ffcbd7a8d: Verifying Checksum Step #5: 051ffcbd7a8d: Download complete Step #5: 4ae5c2251568: Verifying Checksum Step #5: 4ae5c2251568: Download complete Step #5: 41d4e8e61eb4: Pull complete Step #5: c661988ba1db: Verifying Checksum Step #5: c661988ba1db: Download complete Step #5: 0d16c817421f: Verifying Checksum Step #5: 0d16c817421f: Download complete Step #5: cbc7fe6dfb6c: Verifying Checksum Step #5: cbc7fe6dfb6c: Download complete Step #5: 2aaf7982a1de: Verifying Checksum Step #5: 2aaf7982a1de: Download complete Step #5: dc2a533a73a6: Pull complete Step #5: eae6f7408e92: Pull complete Step #5: 78ddb15730f0: Pull complete Step #5: 8b68a38b3419: Pull complete Step #5: ebaa4bfc6675: Pull complete Step #5: ccb535e2aa4b: Pull complete Step #5: aa54c54ac092: Pull complete Step #5: eff346a16803: Pull complete Step #5: 0d16c817421f: Pull complete Step #5: ea996eb1b927: Pull complete Step #5: 2aaf7982a1de: Pull complete Step #5: 4409786150f8: Pull complete Step #5: ea5eb927e900: Pull complete Step #5: cbc7fe6dfb6c: Pull complete Step #5: 65abf2f5069a: Pull complete Step #5: fd7d779a89a3: Pull complete Step #5: 051ffcbd7a8d: Pull complete Step #5: aa113770f1c5: Pull complete Step #5: c661988ba1db: Pull complete Step #5: 4ae5c2251568: Pull complete Step #5: Digest: sha256:e5f37faf560fa998e959cfd8c5d0553442e0f218e81ed51cd02f253c840e6d69 Step #5: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: Running go target FuzzApplyClusterMerge Step #5: Running go target FuzzValidateMeshConfig Step #5: Running go target fuzz_grpc_gen_generate Step #5: Running go target fuzz_compare_diff Step #5: Running go target FuzzShallowCopyPortTrafficPolicy Step #5: Running go target fuzz_create_cert_e2e_using_client_cert_authenticator Step #5: Running go target fuzz_parse_inputs Step #5: Running go target fuzz_metadata_list_matcher Step #5: Running go target FuzzDeepCopyWorkloadInstance Step #5: Running go target fuzz_update_verified_cert_bundle_from_file Step #5: Running go target FuzzBuildHTTP Step #5: Running go target fuzz_workload_entry Step #5: Running go target fuzz_xds Step #5: Running go target fuzz_find_root_cert_from_certificate_chain_bytes Step #5: Generated 1341 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzApplyClusterMerge Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 629 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDeepCopyWorkloadInstance Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 9231 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzValidateMeshConfig Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1254 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzShallowCopyPortTrafficPolicy Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 629 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildHTTP Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzIstioCASign Step #5: Running go target fuzz_crd_roundtrip Step #5: Running go target FuzzDeepCopyIstioEndpoint Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 286 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzIstioCASign Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 555 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDeepCopyIstioEndpoint Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzBuildSidecarOutboundListeners Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzDeepCopyServiceInstance Step #5: Running go target FuzzApplyLocalityLBSetting Step #5: Running go target fuzz_config_validation2 Step #5: Running go target FuzzCreateCertificate Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 966 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzDeepCopyServiceInstance Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 634 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildSidecarOutboundListeners Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 315 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzCreateCertificate Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 1071 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzApplyLocalityLBSetting Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzMergeTrafficPolicy Step #5: Running go target fuzz_bnm_unmarshal_json Step #5: Running go target FuzzRunTemplate Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 57 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzRunTemplate Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 369 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzMergeTrafficPolicy Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_kube_crd Step #5: Running go target fuzz_parse_mesh_networks Step #5: Running go target fuzz_validate_mesh_config Step #5: Running go target fuzz_aggregate_controller Step #5: Running go target fuzz_new_bootstrap_server Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_config_validation Step #5: Running go target fuzz_extract_ids Step #5: Running go target FuzzBuildGatewayListeners Step #5: Running go target fuzz_gen_csr Step #5: Running go target FuzzShallowCopyTrafficPolicy Step #5: Generated 648 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildGatewayListeners Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 380 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzShallowCopyTrafficPolicy Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_verify_certificate Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target FuzzKubeController Step #5: Running go target fuzz_cidr_range Step #5: Running go target FuzzReadCACert Step #5: Running go target FuzzBuildTCP Step #5: Running go target FuzzBuildSecurityCaller Step #5: Running go target fuzz_analyzer Step #5: Generated 247 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzKubeController Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 612 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildTCP Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_header_matcher Step #5: Generated 3334 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzReadCACert Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 2369 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildSecurityCaller Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_jwt_util Step #5: Running go target FuzzWriteTo Step #5: Running go target FuzzBuildSidecarOutboundHTTPRouteConfig Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_init_context Step #5: Running go target fuzz_validate_clusters Step #5: Generated 626 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzBuildSidecarOutboundHTTPRouteConfig Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_host_matcher Step #5: Running go target fuzz_into_resource_file Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_galley_diag Step #5: Running go target FuzzValidateHeaderValue Step #5: Running go target fuzz_parse_pem_encoded_certificate_chain Step #5: Generated 3979 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzWriteTo Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: Generated 379 fuzz corpus files in /workspace/out/libfuzzer-coverage-x86_64/testdata/fuzz/FuzzValidateHeaderValue Step #5: /workspace/out/libfuzzer-coverage-x86_64 /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_config_validation_3 Step #5: Running go target fuzz_pem_cert_bytes_to_string Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 63e5bc7682b8: Already exists Step #6: 73627a576b0e: Already exists Step #6: 55a27ac172bb: Already exists Step #6: 5675beb8625d: Already exists Step #6: d159e7e67e4c: Already exists Step #6: 2fecd7944fda: Already exists Step #6: d4c611b0d4b1: Pulling fs layer Step #6: 575e3b197795: Pulling fs layer Step #6: 575e3b197795: Verifying Checksum Step #6: 575e3b197795: Download complete Step #6: d4c611b0d4b1: Verifying Checksum Step #6: d4c611b0d4b1: Download complete Step #6: d4c611b0d4b1: Pull complete Step #6: 575e3b197795: Pull complete Step #6: Digest: sha256:50bed1cbb8f6cbafc963c53d9f42504a325f5a962ad21f5a5fe68a8d23172224 Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/5 files][ 0.0 B/ 19.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/cpu.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][ 0.0 B/ 19.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: / [0/5 files][ 0.0 B/ 19.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/5 files][ 0.0 B/ 19.2 MiB] 0% Done / [0/5 files][ 0.0 B/ 19.2 MiB] 0% Done / [1/5 files][ 2.8 MiB/ 19.2 MiB] 14% Done / [2/5 files][ 9.2 MiB/ 19.2 MiB] 48% Done / [3/5 files][ 12.1 MiB/ 19.2 MiB] 63% Done / [4/5 files][ 19.2 MiB/ 19.2 MiB] 99% Done / [5/5 files][ 19.2 MiB/ 19.2 MiB] 100% Done Step #7: Operation completed over 5 objects/19.2 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDeepCopyWorkloadInstance.json [Content-Type=application/json]... Step #9: / [0/56 files][ 0.0 B/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_jwt_util.json [Content-Type=application/json]... Step #9: / [0/56 files][ 0.0 B/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_metadata_list_matcher.json [Content-Type=application/json]... Step #9: / [0/56 files][ 0.0 B/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzWriteTo.json [Content-Type=application/json]... Step #9: / [0/56 files][ 0.0 B/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_host_matcher.json [Content-Type=application/json]... Step #9: / [0/56 files][ 0.0 B/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parse_pem_encoded_certificate_chain.json [Content-Type=application/json]... Step #9: / [0/56 files][ 91.0 KiB/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_config_validation_3.json [Content-Type=application/json]... Step #9: / [0/56 files][ 91.0 KiB/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildGatewayListeners.json [Content-Type=application/json]... Step #9: / [0/56 files][ 91.0 KiB/ 10.6 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzRunTemplate.json [Content-Type=application/json]... Step #9: / [0/56 files][632.0 KiB/ 10.6 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_workload_entry.json [Content-Type=application/json]... Step #9: / [0/56 files][937.1 KiB/ 10.6 MiB] 8% Done / [1/56 files][ 1.2 MiB/ 10.6 MiB] 11% Done / [2/56 files][ 1.2 MiB/ 10.6 MiB] 11% Done / [3/56 files][ 1.2 MiB/ 10.6 MiB] 11% Done / [4/56 files][ 1.4 MiB/ 10.6 MiB] 13% Done / [5/56 files][ 1.4 MiB/ 10.6 MiB] 13% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzShallowCopyPortTrafficPolicy.json [Content-Type=application/json]... Step #9: / [5/56 files][ 1.6 MiB/ 10.6 MiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_init_context.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildSecurityCaller.json [Content-Type=application/json]... Step #9: / [5/56 files][ 1.7 MiB/ 10.6 MiB] 15% Done / [5/56 files][ 1.7 MiB/ 10.6 MiB] 15% Done / [6/56 files][ 2.0 MiB/ 10.6 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzIstioCASign.json [Content-Type=application/json]... Step #9: / [6/56 files][ 2.0 MiB/ 10.6 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_find_root_cert_from_certificate_chain_bytes.json [Content-Type=application/json]... Step #9: / [6/56 files][ 2.0 MiB/ 10.6 MiB] 18% Done / [7/56 files][ 2.0 MiB/ 10.6 MiB] 18% Done / [8/56 files][ 2.0 MiB/ 10.6 MiB] 18% Done / [9/56 files][ 2.0 MiB/ 10.6 MiB] 19% Done / [10/56 files][ 2.3 MiB/ 10.6 MiB] 21% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_crd_roundtrip.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.4 MiB/ 10.6 MiB] 22% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_grpc_gen_generate.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.4 MiB/ 10.6 MiB] 22% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDeepCopyIstioEndpoint.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.4 MiB/ 10.6 MiB] 22% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzValidateHeaderValue.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildHTTP.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_header_matcher.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzReadCACert.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_validate_clusters.json [Content-Type=application/json]... Step #9: / [10/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done / [11/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parse_mesh_networks.json [Content-Type=application/json]... Step #9: / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_update_verified_cert_bundle_from_file.json [Content-Type=application/json]... Step #9: / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_parse_inputs.json [Content-Type=application/json]... Step #9: / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildTCP.json [Content-Type=application/json]... Step #9: / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_create_cert_e2e_using_client_cert_authenticator.json [Content-Type=application/json]... Step #9: / [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done - Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_extract_ids.json [Content-Type=application/json]... Step #9: - [12/56 files][ 2.6 MiB/ 10.6 MiB] 25% Done - [13/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_cidr_range.json [Content-Type=application/json]... Step #9: - [13/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzShallowCopyTrafficPolicy.json [Content-Type=application/json]... Step #9: - [13/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done - [14/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done - [15/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_gen_csr.json [Content-Type=application/json]... Step #9: - [15/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_new_bootstrap_server.json [Content-Type=application/json]... Step #9: - [15/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_verify_certificate.json [Content-Type=application/json]... Step #9: - [15/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildSidecarOutboundListeners.json [Content-Type=application/json]... Step #9: - [15/56 files][ 2.9 MiB/ 10.6 MiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_config_validation.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.2 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_validate_mesh_config.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.2 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzDeepCopyServiceInstance.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.2 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzKubeController.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.2 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_into_resource_file.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.2 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_analyzer.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.3 MiB/ 10.6 MiB] 30% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzValidateMeshConfig.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.4 MiB/ 10.6 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_kube_crd.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.4 MiB/ 10.6 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_bnm_unmarshal_json.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.4 MiB/ 10.6 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_compare_diff.json [Content-Type=application/json]... Step #9: - [15/56 files][ 3.4 MiB/ 10.6 MiB] 32% Done - [16/56 files][ 3.7 MiB/ 10.6 MiB] 34% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: - [16/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_xds.json [Content-Type=application/json]... Step #9: - [16/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_config_validation2.json [Content-Type=application/json]... Step #9: - [16/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_pem_cert_bytes_to_string.json [Content-Type=application/json]... Step #9: - [16/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done - [17/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_aggregate_controller.json [Content-Type=application/json]... Step #9: - [17/56 files][ 3.8 MiB/ 10.6 MiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzCreateCertificate.json [Content-Type=application/json]... Step #9: - [17/56 files][ 4.1 MiB/ 10.6 MiB] 38% Done - [18/56 files][ 4.6 MiB/ 10.6 MiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzApplyLocalityLBSetting.json [Content-Type=application/json]... Step #9: - [18/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzApplyClusterMerge.json [Content-Type=application/json]... Step #9: - [18/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzMergeTrafficPolicy.json [Content-Type=application/json]... Step #9: - [18/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/FuzzBuildSidecarOutboundHTTPRouteConfig.json [Content-Type=application/json]... Step #9: - [19/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done - [19/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done - [20/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_galley_diag.json [Content-Type=application/json]... Step #9: - [20/56 files][ 4.9 MiB/ 10.6 MiB] 46% Done - [21/56 files][ 5.2 MiB/ 10.6 MiB] 48% Done - [22/56 files][ 5.6 MiB/ 10.6 MiB] 53% Done - [23/56 files][ 5.6 MiB/ 10.6 MiB] 53% Done - [24/56 files][ 5.9 MiB/ 10.6 MiB] 55% Done - [25/56 files][ 5.9 MiB/ 10.6 MiB] 55% Done - [26/56 files][ 5.9 MiB/ 10.6 MiB] 55% Done - [27/56 files][ 5.9 MiB/ 10.6 MiB] 55% Done - [28/56 files][ 6.7 MiB/ 10.6 MiB] 63% Done - [29/56 files][ 7.0 MiB/ 10.6 MiB] 66% Done - [30/56 files][ 7.0 MiB/ 10.6 MiB] 66% Done - [31/56 files][ 7.0 MiB/ 10.6 MiB] 66% Done - [32/56 files][ 7.6 MiB/ 10.6 MiB] 71% Done - [33/56 files][ 7.9 MiB/ 10.6 MiB] 74% Done - [34/56 files][ 7.9 MiB/ 10.6 MiB] 74% Done - [35/56 files][ 8.2 MiB/ 10.6 MiB] 77% Done - [36/56 files][ 8.3 MiB/ 10.6 MiB] 78% Done - [37/56 files][ 8.3 MiB/ 10.6 MiB] 78% Done - [38/56 files][ 8.6 MiB/ 10.6 MiB] 81% Done - [39/56 files][ 8.8 MiB/ 10.6 MiB] 83% Done - [40/56 files][ 8.8 MiB/ 10.6 MiB] 83% Done - [41/56 files][ 8.8 MiB/ 10.6 MiB] 83% Done - [42/56 files][ 9.1 MiB/ 10.6 MiB] 86% Done - [43/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done - [44/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done - [45/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done - [46/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done - [47/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done \ \ [48/56 files][ 9.8 MiB/ 10.6 MiB] 92% Done \ [49/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [50/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [51/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [52/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [53/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [54/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [55/56 files][ 10.6 MiB/ 10.6 MiB] 99% Done \ [56/56 files][ 10.6 MiB/ 10.6 MiB] 100% Done Step #9: Operation completed over 56 objects/10.6 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_parse_mesh_networks.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 0.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_update_verified_cert_bundle_from_file.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 0.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_find_root_cert_from_certificate_chain_bytes.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 0.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzValidateHeaderValue.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 0.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_parse_inputs.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 0.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildSidecarOutboundHTTPRouteConfig.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_metadata_list_matcher.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 875.0 B/ 3.2 GiB] 0% Done / [0/55 files][ 875.0 B/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzValidateMeshConfig.log [Content-Type=application/octet-stream]... Step #11: / [0/55 files][ 1.1 KiB/ 3.2 GiB] 0% Done / [1/55 files][ 1.1 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzIstioCASign.log [Content-Type=application/octet-stream]... Step #11: / [1/55 files][ 1.1 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDeepCopyWorkloadInstance.log [Content-Type=application/octet-stream]... Step #11: / [1/55 files][ 1.1 KiB/ 3.2 GiB] 0% Done / [2/55 files][ 1.1 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDeepCopyServiceInstance.log [Content-Type=application/octet-stream]... Step #11: / [2/55 files][ 8.7 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzDeepCopyIstioEndpoint.log [Content-Type=application/octet-stream]... Step #11: / [3/55 files][ 8.7 KiB/ 3.2 GiB] 0% Done / [3/55 files][ 8.7 KiB/ 3.2 GiB] 0% Done / [4/55 files][ 8.7 KiB/ 3.2 GiB] 0% Done / [5/55 files][ 8.8 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_validate_mesh_config.log [Content-Type=application/octet-stream]... Step #11: / [5/55 files][ 8.8 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_gen_csr.log [Content-Type=application/octet-stream]... Step #11: / [5/55 files][ 8.8 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_host_matcher.log [Content-Type=application/octet-stream]... Step #11: / [5/55 files][ 8.9 KiB/ 3.2 GiB] 0% Done / [6/55 files][ 8.9 KiB/ 3.2 GiB] 0% Done / [7/55 files][ 9.2 KiB/ 3.2 GiB] 0% Done / [8/55 files][ 9.3 KiB/ 3.2 GiB] 0% Done / [9/55 files][ 9.6 KiB/ 3.2 GiB] 0% Done / [10/55 files][ 9.6 KiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_config_validation_3.log [Content-Type=application/octet-stream]... Step #11: / [10/55 files][ 1.8 MiB/ 3.2 GiB] 0% Done / [11/55 files][ 1.8 MiB/ 3.2 GiB] 0% Done / [12/55 files][ 2.6 MiB/ 3.2 GiB] 0% Done / [13/55 files][ 3.4 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_bnm_unmarshal_json.log [Content-Type=application/octet-stream]... Step #11: / [13/55 files][ 3.9 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildHTTP.log [Content-Type=application/octet-stream]... Step #11: / [13/55 files][ 4.4 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_analyzer.log [Content-Type=application/octet-stream]... Step #11: / [13/55 files][ 5.2 MiB/ 3.2 GiB] 0% Done / [14/55 files][ 5.2 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_into_resource_file.log [Content-Type=application/octet-stream]... Step #11: ==> NOTE: You are uploading one or more large file(s), which would run Step #11: significantly faster if you enable parallel composite uploads. This Step #11: feature can be enabled by editing the Step #11: "parallel_composite_upload_threshold" value in your .boto Step #11: configuration file. However, note that if you do this large files will Step #11: be uploaded as `composite objects Step #11: `_,which Step #11: means that any user who downloads such objects will need to have a Step #11: compiled crcmod installed (see "gsutil help crcmod"). This is because Step #11: without a compiled crcmod, computing checksums on composite objects is Step #11: so slow that gsutil disables downloads of composite objects. Step #11: Step #11: / [14/55 files][ 5.9 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_aggregate_controller.log [Content-Type=application/octet-stream]... Step #11: / [14/55 files][ 6.2 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_xds.log [Content-Type=application/octet-stream]... Step #11: / [14/55 files][ 6.7 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildSidecarOutboundListeners.log [Content-Type=application/octet-stream]... Step #11: / [14/55 files][ 7.7 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzWriteTo.log [Content-Type=application/octet-stream]... Step #11: / [14/55 files][ 10.6 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildGatewayListeners.log [Content-Type=application/octet-stream]... Step #11: / [14/55 files][ 13.2 MiB/ 3.2 GiB] 0% Done - Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_jwt_util.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 14.7 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzApplyLocalityLBSetting.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 15.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_cidr_range.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 15.7 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzRunTemplate.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 16.8 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzReadCACert.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 17.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzShallowCopyTrafficPolicy.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 19.4 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_parse_pem_encoded_certificate_chain.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 20.1 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_verify_certificate.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_galley_diag.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 20.6 MiB/ 3.2 GiB] 0% Done - [14/55 files][ 20.6 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_config_validation2.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 21.2 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_workload_entry.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_crd_roundtrip.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_grpc_gen_generate.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzCreateCertificate.log [Content-Type=application/octet-stream]... Step #11: - [14/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzMergeTrafficPolicy.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzApplyClusterMerge.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildTCP.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_compare_diff.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzBuildSecurityCaller.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_header_matcher.log [Content-Type=application/octet-stream]... Step #11: - [15/55 files][ 21.5 MiB/ 3.2 GiB] 0% Done - [16/55 files][ 22.0 MiB/ 3.2 GiB] 0% Done - [17/55 files][ 23.5 MiB/ 3.2 GiB] 0% Done - [18/55 files][ 24.8 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_config_validation.log [Content-Type=application/octet-stream]... Step #11: - [18/55 files][ 25.9 MiB/ 3.2 GiB] 0% Done - [19/55 files][ 26.1 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_kube_crd.log [Content-Type=application/octet-stream]... Step #11: - [19/55 files][ 26.6 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_extract_ids.log [Content-Type=application/octet-stream]... Step #11: - [19/55 files][ 28.2 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzShallowCopyPortTrafficPolicy.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_new_bootstrap_server.log [Content-Type=application/octet-stream]... Step #11: - [19/55 files][ 29.0 MiB/ 3.2 GiB] 0% Done - [19/55 files][ 29.0 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_validate_clusters.log [Content-Type=application/octet-stream]... Step #11: - [19/55 files][ 30.5 MiB/ 3.2 GiB] 0% Done - [20/55 files][ 31.0 MiB/ 3.2 GiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_pem_cert_bytes_to_string.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_create_cert_e2e_using_client_cert_authenticator.log [Content-Type=application/octet-stream]... Step #11: - [20/55 files][ 32.8 MiB/ 3.2 GiB] 1% Done - [20/55 files][ 32.8 MiB/ 3.2 GiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/FuzzKubeController.log [Content-Type=application/octet-stream]... Step #11: - [20/55 files][ 33.8 MiB/ 3.2 GiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_init_context.log [Content-Type=application/octet-stream]... Step #11: - [20/55 files][ 34.4 MiB/ 3.2 GiB] 1% Done - [21/55 files][ 38.0 MiB/ 3.2 GiB] 1% Done - [22/55 files][ 49.6 MiB/ 3.2 GiB] 1% Done - [23/55 files][ 50.4 MiB/ 3.2 GiB] 1% Done - [24/55 files][ 61.2 MiB/ 3.2 GiB] 1% Done - [25/55 files][ 62.0 MiB/ 3.2 GiB] 1% Done - [26/55 files][ 65.0 MiB/ 3.2 GiB] 1% Done - [27/55 files][ 71.1 MiB/ 3.2 GiB] 2% Done - [28/55 files][ 71.4 MiB/ 3.2 GiB] 2% Done - [29/55 files][ 83.5 MiB/ 3.2 GiB] 2% Done - [30/55 files][ 90.7 MiB/ 3.2 GiB] 2% Done - [31/55 files][ 97.7 MiB/ 3.2 GiB] 2% Done - [32/55 files][108.8 MiB/ 3.2 GiB] 3% Done - [33/55 files][110.1 MiB/ 3.2 GiB] 3% Done - [34/55 files][110.1 MiB/ 3.2 GiB] 3% Done - [35/55 files][110.6 MiB/ 3.2 GiB] 3% Done - [36/55 files][124.4 MiB/ 3.2 GiB] 3% Done - [37/55 files][124.6 MiB/ 3.2 GiB] 3% Done \ \ [38/55 files][148.8 MiB/ 3.2 GiB] 4% Done \ [39/55 files][151.7 MiB/ 3.2 GiB] 4% Done \ [40/55 files][153.2 MiB/ 3.2 GiB] 4% Done \ [41/55 files][160.0 MiB/ 3.2 GiB] 4% Done \ [42/55 files][161.5 MiB/ 3.2 GiB] 4% Done \ [43/55 files][162.0 MiB/ 3.2 GiB] 4% Done \ [44/55 files][162.0 MiB/ 3.2 GiB] 4% Done \ [45/55 files][162.5 MiB/ 3.2 GiB] 4% Done \ [46/55 files][165.4 MiB/ 3.2 GiB] 5% Done \ [47/55 files][171.0 MiB/ 3.2 GiB] 5% Done \ [48/55 files][178.5 MiB/ 3.2 GiB] 5% Done \ [49/55 files][180.8 MiB/ 3.2 GiB] 5% Done \ [50/55 files][180.8 MiB/ 3.2 GiB] 5% Done \ [51/55 files][186.0 MiB/ 3.2 GiB] 5% Done \ [52/55 files][249.1 MiB/ 3.2 GiB] 7% Done \ [53/55 files][251.7 MiB/ 3.2 GiB] 7% Done | | [54/55 files][270.0 MiB/ 3.2 GiB] 8% Done / / [54/55 files][408.4 MiB/ 3.2 GiB] 12% Done - \ \ [54/55 files][545.9 MiB/ 3.2 GiB] 16% Done | / / [54/55 files][683.8 MiB/ 3.2 GiB] 20% Done - - [54/55 files][817.9 MiB/ 3.2 GiB] 24% Done \ | | [54/55 files][949.1 MiB/ 3.2 GiB] 28% Done / - - [54/55 files][ 1.1 GiB/ 3.2 GiB] 32% Done \ \ [54/55 files][ 1.2 GiB/ 3.2 GiB] 36% Done | / / [54/55 files][ 1.3 GiB/ 3.2 GiB] 41% Done - \ \ [54/55 files][ 1.4 GiB/ 3.2 GiB] 45% Done | | [54/55 files][ 1.6 GiB/ 3.2 GiB] 49% Done 134.1 MiB/s ETA 00:00:12 / - - [54/55 files][ 1.7 GiB/ 3.2 GiB] 53% Done 134.9 MiB/s ETA 00:00:11 \ | | [54/55 files][ 1.8 GiB/ 3.2 GiB] 57% Done 136.1 MiB/s ETA 00:00:10 / / [54/55 files][ 2.0 GiB/ 3.2 GiB] 61% Done 136.3 MiB/s ETA 00:00:09 - \ \ [54/55 files][ 2.1 GiB/ 3.2 GiB] 66% Done 136.2 MiB/s ETA 00:00:08 | / / [54/55 files][ 2.2 GiB/ 3.2 GiB] 70% Done 136.6 MiB/s ETA 00:00:07 - - [54/55 files][ 2.4 GiB/ 3.2 GiB] 74% Done 136.8 MiB/s ETA 00:00:06 \ | | [54/55 files][ 2.5 GiB/ 3.2 GiB] 78% Done 136.8 MiB/s ETA 00:00:05 / - - [54/55 files][ 2.6 GiB/ 3.2 GiB] 82% Done 136.7 MiB/s ETA 00:00:04 \ \ [54/55 files][ 2.8 GiB/ 3.2 GiB] 86% Done 136.2 MiB/s ETA 00:00:03 | / / [54/55 files][ 2.9 GiB/ 3.2 GiB] 90% Done 135.8 MiB/s ETA 00:00:02 - \ \ [54/55 files][ 3.0 GiB/ 3.2 GiB] 95% Done 135.6 MiB/s ETA 00:00:01 | | [54/55 files][ 3.2 GiB/ 3.2 GiB] 99% Done 135.8 MiB/s ETA 00:00:00 | [55/55 files][ 3.2 GiB/ 3.2 GiB] 100% Done 131.6 MiB/s ETA 00:00:00 / Step #11: Operation completed over 55 objects/3.2 GiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 463.0 B] / [1 files][ 463.0 B/ 463.0 B] Step #12: Operation completed over 1 objects/463.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 303 0 0 100 303 0 1429 --:--:-- --:--:-- --:--:-- 1436 Finished Step #13 PUSH DONE