starting build "237ab241-c2c8-45f3-96d9-55c7efd24e6e" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 81271cf7a52d: Pulling fs layer Step #1: 076e7ea7d2be: Pulling fs layer Step #1: f972795033e0: Pulling fs layer Step #1: 955fcbf34e0c: Pulling fs layer Step #1: 3d3d7fb65ba7: Pulling fs layer Step #1: 174afde8b08f: Pulling fs layer Step #1: 45de6e62747b: Pulling fs layer Step #1: e2d79d747ed8: Pulling fs layer Step #1: ae4e2bcce13c: Pulling fs layer Step #1: 7ebb7f4ef4ba: Pulling fs layer Step #1: a3f19c78a4e0: Pulling fs layer Step #1: d5a5e8ce33af: Pulling fs layer Step #1: 73be63f18a2d: Pulling fs layer Step #1: 26e1ff8f4610: Pulling fs layer Step #1: ebd8249059d4: Pulling fs layer Step #1: f46125ccc6bc: Pulling fs layer Step #1: 3d3d7fb65ba7: Waiting Step #1: f972795033e0: Waiting Step #1: 1e6f40e53d7f: Pulling fs layer Step #1: 174afde8b08f: Waiting Step #1: bb416e3a2055: Pulling fs layer Step #1: 955fcbf34e0c: Waiting Step #1: 45de6e62747b: Waiting Step #1: 20b4f3764835: Pulling fs layer Step #1: 3cb217e698e8: Pulling fs layer Step #1: 7ebb7f4ef4ba: Waiting Step #1: e2d79d747ed8: Waiting Step #1: 17edcc97785b: Pulling fs layer Step #1: da6fa1422508: Pulling fs layer Step #1: ae4e2bcce13c: Waiting Step #1: 236229e44656: Pulling fs layer Step #1: fff17b067246: Pulling fs layer Step #1: d5a5e8ce33af: Waiting Step #1: e667c6c012a1: Pulling fs layer Step #1: 1c6dc0c7729f: Pulling fs layer Step #1: 50e898cc1c8e: Pulling fs layer Step #1: db7af1b26c60: Pulling fs layer Step #1: 73be63f18a2d: Waiting Step #1: 26e1ff8f4610: Waiting Step #1: f96a58b6493f: Pulling fs layer Step #1: ebd8249059d4: Waiting Step #1: 09eb8efc64ee: Pulling fs layer Step #1: 8ca62bd96fe7: Pulling fs layer Step #1: f46125ccc6bc: Waiting Step #1: 03a4a6888a2f: Pulling fs layer Step #1: a3f19c78a4e0: Waiting Step #1: 1e6f40e53d7f: Waiting Step #1: fff17b067246: Waiting Step #1: db7af1b26c60: Waiting Step #1: bb416e3a2055: Waiting Step #1: f96a58b6493f: Waiting Step #1: e667c6c012a1: Waiting Step #1: 20b4f3764835: Waiting Step #1: 1c6dc0c7729f: Waiting Step #1: 09eb8efc64ee: Waiting Step #1: 50e898cc1c8e: Waiting Step #1: 3cb217e698e8: Waiting Step #1: 17edcc97785b: Waiting Step #1: da6fa1422508: Waiting Step #1: 236229e44656: Waiting Step #1: 8ca62bd96fe7: Waiting Step #1: 03a4a6888a2f: Waiting Step #1: 076e7ea7d2be: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f972795033e0: Download complete Step #1: 955fcbf34e0c: Verifying Checksum Step #1: 955fcbf34e0c: Download complete Step #1: 3d3d7fb65ba7: Verifying Checksum Step #1: 3d3d7fb65ba7: Download complete Step #1: 45de6e62747b: Verifying Checksum Step #1: 45de6e62747b: Download complete Step #1: e2d79d747ed8: Verifying Checksum Step #1: e2d79d747ed8: Download complete Step #1: 81271cf7a52d: Verifying Checksum Step #1: 81271cf7a52d: Download complete Step #1: 7ebb7f4ef4ba: Download complete Step #1: a3f19c78a4e0: Verifying Checksum Step #1: a3f19c78a4e0: Download complete Step #1: d5a5e8ce33af: Verifying Checksum Step #1: d5a5e8ce33af: Download complete Step #1: 73be63f18a2d: Verifying Checksum Step #1: 73be63f18a2d: Download complete Step #1: 26e1ff8f4610: Verifying Checksum Step #1: 26e1ff8f4610: Download complete Step #1: b549f31133a9: Pull complete Step #1: ebd8249059d4: Download complete Step #1: f46125ccc6bc: Verifying Checksum Step #1: f46125ccc6bc: Download complete Step #1: 1e6f40e53d7f: Verifying Checksum Step #1: 1e6f40e53d7f: Download complete Step #1: bb416e3a2055: Verifying Checksum Step #1: bb416e3a2055: Download complete Step #1: 20b4f3764835: Verifying Checksum Step #1: 20b4f3764835: Download complete Step #1: 3cb217e698e8: Verifying Checksum Step #1: 3cb217e698e8: Download complete Step #1: ae4e2bcce13c: Verifying Checksum Step #1: ae4e2bcce13c: Download complete Step #1: 17edcc97785b: Verifying Checksum Step #1: 17edcc97785b: Download complete Step #1: da6fa1422508: Verifying Checksum Step #1: da6fa1422508: Download complete Step #1: 236229e44656: Verifying Checksum Step #1: 236229e44656: Download complete Step #1: fff17b067246: Verifying Checksum Step #1: fff17b067246: Download complete Step #1: e667c6c012a1: Verifying Checksum Step #1: e667c6c012a1: Download complete Step #1: 50e898cc1c8e: Verifying Checksum Step #1: 50e898cc1c8e: Download complete Step #1: 1c6dc0c7729f: Verifying Checksum Step #1: 1c6dc0c7729f: Download complete Step #1: db7af1b26c60: Verifying Checksum Step #1: db7af1b26c60: Download complete Step #1: f96a58b6493f: Verifying Checksum Step #1: f96a58b6493f: Download complete Step #1: 09eb8efc64ee: Verifying Checksum Step #1: 09eb8efc64ee: Download complete Step #1: 03a4a6888a2f: Verifying Checksum Step #1: 03a4a6888a2f: Download complete Step #1: 174afde8b08f: Verifying Checksum Step #1: 174afde8b08f: Download complete Step #1: 8ca62bd96fe7: Verifying Checksum Step #1: 8ca62bd96fe7: Download complete Step #1: 81271cf7a52d: Pull complete Step #1: 076e7ea7d2be: Pull complete Step #1: f972795033e0: Pull complete Step #1: 955fcbf34e0c: Pull complete Step #1: 3d3d7fb65ba7: Pull complete Step #1: 174afde8b08f: Pull complete Step #1: 45de6e62747b: Pull complete Step #1: e2d79d747ed8: Pull complete Step #1: ae4e2bcce13c: Pull complete Step #1: 7ebb7f4ef4ba: Pull complete Step #1: a3f19c78a4e0: Pull complete Step #1: d5a5e8ce33af: Pull complete Step #1: 73be63f18a2d: Pull complete Step #1: 26e1ff8f4610: Pull complete Step #1: ebd8249059d4: Pull complete Step #1: f46125ccc6bc: Pull complete Step #1: 1e6f40e53d7f: Pull complete Step #1: bb416e3a2055: Pull complete Step #1: 20b4f3764835: Pull complete Step #1: 3cb217e698e8: Pull complete Step #1: 17edcc97785b: Pull complete Step #1: da6fa1422508: Pull complete Step #1: 236229e44656: Pull complete Step #1: fff17b067246: Pull complete Step #1: e667c6c012a1: Pull complete Step #1: 1c6dc0c7729f: Pull complete Step #1: 50e898cc1c8e: Pull complete Step #1: db7af1b26c60: Pull complete Step #1: f96a58b6493f: Pull complete Step #1: 09eb8efc64ee: Pull complete Step #1: 8ca62bd96fe7: Pull complete Step #1: 03a4a6888a2f: Pull complete Step #1: Digest: sha256:0c2b715b3a94af70bb0a0ef764bec929f15a9179962b3ca60f9d561bd3fd51fd Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 2662b307bc73 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1: ---> Running in dd71cf79c912 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (178 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1: gcc set to manually installed. Step #1: libc6-dev is already the newest version (2.31-0ubuntu9.14). Step #1: wget is already the newest version (1.20.3-1ubuntu2). Step #1: The following additional packages will be installed: Step #1: libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: duperemove seccomp Step #1: The following NEW packages will be installed: Step #1: btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1: liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.2 MB of archives. Step #1: After this operation, 49.1 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.6 [6032 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.2 MB in 1s (20.4 MB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.6_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package liblzo2-2:amd64. Step #1: Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1: Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1: Selecting previously unselected package btrfs-progs. Step #1: Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1: Unpacking btrfs-progs (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs0:amd64. Step #1: Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs-dev:amd64. Step #1: Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up liblzo2-2:amd64 (2.10-2) ... Step #1: Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up btrfs-progs (5.4.1-2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.14) ... Step #1: Removing intermediate container dd71cf79c912 Step #1: ---> 585d58769fca Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1: ---> Running in 9b75b2cf002a Step #1: Cloning into 'containerd'... Step #1: Removing intermediate container 9b75b2cf002a Step #1: ---> b9c5bdc8a972 Step #1: Step 4/6 : RUN git clone --depth=1 --branch=dev https://github.com/AdamKorcz/instrumentation Step #1: ---> Running in fc64369c4f22 Step #1: Cloning into 'instrumentation'... Step #1: Removing intermediate container fc64369c4f22 Step #1: ---> d70152f5ba28 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 71a385c654f2 Step #1: Step 6/6 : WORKDIR $SRC/containerd Step #1: ---> Running in 025307aef048 Step #1: Removing intermediate container 025307aef048 Step #1: ---> db88dd6d8e02 Step #1: Successfully built db88dd6d8e02 Step #1: Successfully tagged gcr.io/oss-fuzz/containerd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file0xavuO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=39af94663cf87ba5ab72e41ae6f6409fadd3084d Step #2 - "srcmap": + jq_inplace /tmp/file0xavuO '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileR8ACl9 Step #2 - "srcmap": + cat /tmp/file0xavuO Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": + mv /tmp/fileR8ACl9 /tmp/file0xavuO Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a Step #2 - "srcmap": + jq_inplace /tmp/file0xavuO '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filepMRALI Step #2 - "srcmap": + cat /tmp/file0xavuO Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a" }' Step #2 - "srcmap": + mv /tmp/filepMRALI /tmp/file0xavuO Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file0xavuO Step #2 - "srcmap": + rm /tmp/file0xavuO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "39af94663cf87ba5ab72e41ae6f6409fadd3084d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-coverage-x86_64": + go run main.go /src/containerd/images Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] [Waiting for headers] Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Working] 0% [Working] 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 32% Reading package lists... 33% Reading package lists... 33% Reading package lists... 47% Reading package lists... 47% Reading package lists... 48% Reading package lists... 48% Reading package lists... 48% Reading package lists... 48% Reading package lists... 57% Reading package lists... 57% Reading package lists... 60% Reading package lists... 60% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 73% Reading package lists... 73% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 76% Reading package lists... 84% Reading package lists... 84% Reading package lists... 86% Reading package lists... 86% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 32% Reading package lists... 33% Reading package lists... 33% Reading package lists... 47% Reading package lists... 47% Reading package lists... 48% Reading package lists... 48% Reading package lists... 48% Reading package lists... 48% Reading package lists... 57% Reading package lists... 57% Reading package lists... 60% Reading package lists... 60% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 73% Reading package lists... 73% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 84% Reading package lists... 84% Reading package lists... 86% Reading package lists... 86% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.20.3-1ubuntu2). Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.21.6.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.21.6.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.1.1-0.20230823135140-4fec88fd00a4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.61.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240102182953-50ed04b92917 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.12.0-rc.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0-rc6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.14 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.28.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.1.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.28.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.100.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.28.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.28.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubelet v0.28.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.2.1-beta.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/sha256-simd v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.23.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.4.1-0.20230718164431-9a2bf3000d16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.10.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.28.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.13.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20231109132714-523115ebc101 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.28.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231214170342-aacd6d4b4611 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/appengine v1.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go/compute v1.23.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo v1.16.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240102182953-50ed04b92917 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20231212172506-995d672761c0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20230323073829-e72429f035bd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cloud.google.com/go v0.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer.go:func FuzzLoadDefaultProfile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/apparmor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzImportIndex(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzzer.go:func FuzzContainerdImport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzCSWalk(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzArchiveExport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_fuzzer.go:func FuzzParseAuth(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzzer.go:func FuzzCRIServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffCompare(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzzer.go:func FuzzExchange(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/fuzz_images.go:func FuzzImagesCheck(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzImageStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzLeaseManager(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContainerStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContentStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/uuid_fuzzer.go:func FuzzUUIDParse(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzUUIDParse fuzz_FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_internal.go:func FuzzParseHostsFile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker/config: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz.go:func FuzzConvertManifest(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz.go:func FuzzFetcher(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer.go:func FuzzDecompressStream(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/pkg/archive/compression: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzzer.go:func FuzzContentStoreWriter(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/plugins/content/local: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 41991, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/41991) remote: Counting objects: 1% (420/41991) remote: Counting objects: 2% (840/41991) remote: Counting objects: 3% (1260/41991) remote: Counting objects: 4% (1680/41991) remote: Counting objects: 5% (2100/41991) remote: Counting objects: 6% (2520/41991) remote: Counting objects: 7% (2940/41991) remote: Counting objects: 8% (3360/41991) remote: Counting objects: 9% (3780/41991) remote: Counting objects: 10% (4200/41991) remote: Counting objects: 11% (4620/41991) remote: Counting objects: 12% (5039/41991) remote: Counting objects: 13% (5459/41991) remote: Counting objects: 14% (5879/41991) remote: Counting objects: 15% (6299/41991) remote: Counting objects: 16% (6719/41991) remote: Counting objects: 17% (7139/41991) remote: Counting objects: 18% (7559/41991) remote: Counting objects: 19% (7979/41991) remote: Counting objects: 20% (8399/41991) remote: Counting objects: 21% (8819/41991) remote: Counting objects: 22% (9239/41991) remote: Counting objects: 23% (9658/41991) remote: Counting objects: 24% (10078/41991) remote: Counting objects: 25% (10498/41991) remote: Counting objects: 26% (10918/41991) remote: Counting objects: 27% (11338/41991) remote: Counting objects: 28% (11758/41991) remote: Counting objects: 29% (12178/41991) remote: Counting objects: 30% (12598/41991) remote: Counting objects: 31% (13018/41991) remote: Counting objects: 32% (13438/41991) remote: Counting objects: 33% (13858/41991) remote: Counting objects: 34% (14277/41991) remote: Counting objects: 35% (14697/41991) remote: Counting objects: 36% (15117/41991) remote: Counting objects: 37% (15537/41991) remote: Counting objects: 38% (15957/41991) remote: Counting objects: 39% (16377/41991) remote: Counting objects: 40% (16797/41991) remote: Counting objects: 41% (17217/41991) remote: Counting objects: 42% (17637/41991) remote: Counting objects: 43% (18057/41991) remote: Counting objects: 44% (18477/41991) remote: Counting objects: 45% (18896/41991) remote: Counting objects: 46% (19316/41991) remote: Counting objects: 47% (19736/41991) remote: Counting objects: 48% (20156/41991) remote: Counting objects: 49% (20576/41991) remote: Counting objects: 50% (20996/41991) remote: Counting objects: 51% (21416/41991) remote: Counting objects: 52% (21836/41991) remote: Counting objects: 53% (22256/41991) remote: Counting objects: 54% (22676/41991) remote: Counting objects: 55% (23096/41991) remote: Counting objects: 56% (23515/41991) remote: Counting objects: 57% (23935/41991) remote: Counting objects: 58% (24355/41991) remote: Counting objects: 59% (24775/41991) remote: Counting objects: 60% (25195/41991) remote: Counting objects: 61% (25615/41991) remote: Counting objects: 62% (26035/41991) remote: Counting objects: 63% (26455/41991) remote: Counting objects: 64% (26875/41991) remote: Counting objects: 65% (27295/41991) remote: Counting objects: 66% (27715/41991) remote: Counting objects: 67% (28134/41991) remote: Counting objects: 68% (28554/41991) remote: Counting objects: 69% (28974/41991) remote: Counting objects: 70% (29394/41991) remote: Counting objects: 71% (29814/41991) remote: Counting objects: 72% (30234/41991) remote: Counting objects: 73% (30654/41991) remote: Counting objects: 74% (31074/41991) remote: Counting objects: 75% (31494/41991) remote: Counting objects: 76% (31914/41991) remote: Counting objects: 77% (32334/41991) remote: Counting objects: 78% (32753/41991) remote: Counting objects: 79% (33173/41991) remote: Counting objects: 80% (33593/41991) remote: Counting objects: 81% (34013/41991) remote: Counting objects: 82% (34433/41991) remote: Counting objects: 83% (34853/41991) remote: Counting objects: 84% (35273/41991) remote: Counting objects: 85% (35693/41991) remote: Counting objects: 86% (36113/41991) remote: Counting objects: 87% (36533/41991) remote: Counting objects: 88% (36953/41991) remote: Counting objects: 89% (37372/41991) remote: Counting objects: 90% (37792/41991) remote: Counting objects: 91% (38212/41991) remote: Counting objects: 92% (38632/41991) remote: Counting objects: 93% (39052/41991) remote: Counting objects: 94% (39472/41991) remote: Counting objects: 95% (39892/41991) remote: Counting objects: 96% (40312/41991) remote: Counting objects: 97% (40732/41991) remote: Counting objects: 98% (41152/41991) remote: Counting objects: 99% (41572/41991) remote: Counting objects: 100% (41991/41991) remote: Counting objects: 100% (41991/41991), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 0% (1/13112) remote: Compressing objects: 1% (132/13112) remote: Compressing objects: 2% (263/13112) remote: Compressing objects: 3% (394/13112) remote: Compressing objects: 4% (525/13112) remote: Compressing objects: 5% (656/13112) remote: Compressing objects: 6% (787/13112) remote: Compressing objects: 7% (918/13112) remote: Compressing objects: 8% (1049/13112) remote: Compressing objects: 9% (1181/13112) remote: Compressing objects: 10% (1312/13112) remote: Compressing objects: 11% (1443/13112) remote: Compressing objects: 12% (1574/13112) remote: Compressing objects: 13% (1705/13112) remote: Compressing objects: 14% (1836/13112) remote: Compressing objects: 15% (1967/13112) remote: Compressing objects: 16% (2098/13112) remote: Compressing objects: 17% (2230/13112) remote: Compressing objects: 18% (2361/13112) remote: Compressing objects: 19% (2492/13112) remote: Compressing objects: 20% (2623/13112) remote: Compressing objects: 21% (2754/13112) remote: Compressing objects: 22% (2885/13112) remote: Compressing objects: 23% (3016/13112) remote: Compressing objects: 24% (3147/13112) remote: Compressing objects: 25% (3278/13112) remote: Compressing objects: 26% (3410/13112) remote: Compressing objects: 27% (3541/13112) remote: Compressing objects: 28% (3672/13112) remote: Compressing objects: 29% (3803/13112) remote: Compressing objects: 30% (3934/13112) remote: Compressing objects: 31% (4065/13112) remote: Compressing objects: 32% (4196/13112) remote: Compressing objects: 33% (4327/13112) remote: Compressing objects: 34% (4459/13112) remote: Compressing objects: 35% (4590/13112) remote: Compressing objects: 36% (4721/13112) remote: Compressing objects: 37% (4852/13112) remote: Compressing objects: 38% (4983/13112) remote: Compressing objects: 39% (5114/13112) remote: Compressing objects: 40% (5245/13112) remote: Compressing objects: 41% (5376/13112) remote: Compressing objects: 42% (5508/13112) remote: Compressing objects: 43% (5639/13112) remote: Compressing objects: 44% (5770/13112) remote: Compressing objects: 45% (5901/13112) remote: Compressing objects: 46% (6032/13112) remote: Compressing objects: 47% (6163/13112) remote: Compressing objects: 48% (6294/13112) remote: Compressing objects: 49% (6425/13112) remote: Compressing objects: 50% (6556/13112) remote: Compressing objects: 51% (6688/13112) remote: Compressing objects: 52% (6819/13112) remote: Compressing objects: 53% (6950/13112) remote: Compressing objects: 54% (7081/13112) remote: Compressing objects: 55% (7212/13112) remote: Compressing objects: 56% (7343/13112) remote: Compressing objects: 57% (7474/13112) remote: Compressing objects: 58% (7605/13112) remote: Compressing objects: 59% (7737/13112) remote: Compressing objects: 60% (7868/13112) remote: Compressing objects: 61% (7999/13112) remote: Compressing objects: 62% (8130/13112) remote: Compressing objects: 63% (8261/13112) remote: Compressing objects: 64% (8392/13112) remote: Compressing objects: 65% (8523/13112) remote: Compressing objects: 66% (8654/13112) remote: Compressing objects: 67% (8786/13112) remote: Compressing objects: 68% (8917/13112) remote: Compressing objects: 69% (9048/13112) remote: Compressing objects: 70% (9179/13112) remote: Compressing objects: 71% (9310/13112) remote: Compressing objects: 72% (9441/13112) remote: Compressing objects: 73% (9572/13112) remote: Compressing objects: 74% (9703/13112) remote: Compressing objects: 75% (9834/13112) remote: Compressing objects: 76% (9966/13112) remote: Compressing objects: 77% (10097/13112) remote: Compressing objects: 78% (10228/13112) remote: Compressing objects: 79% (10359/13112) remote: Compressing objects: 80% (10490/13112) remote: Compressing objects: 81% (10621/13112) remote: Compressing objects: 82% (10752/13112) remote: Compressing objects: 83% (10883/13112) remote: Compressing objects: 84% (11015/13112) remote: Compressing objects: 85% (11146/13112) remote: Compressing objects: 86% (11277/13112) remote: Compressing objects: 87% (11408/13112) remote: Compressing objects: 88% (11539/13112) remote: Compressing objects: 89% (11670/13112) remote: Compressing objects: 90% (11801/13112) remote: Compressing objects: 91% (11932/13112) remote: Compressing objects: 92% (12064/13112) remote: Compressing objects: 93% (12195/13112) remote: Compressing objects: 94% (12326/13112) remote: Compressing objects: 95% (12457/13112) remote: Compressing objects: 96% (12588/13112) remote: Compressing objects: 97% (12719/13112) remote: Compressing objects: 98% (12850/13112) remote: Compressing objects: 99% (12981/13112) remote: Compressing objects: 100% (13112/13112) remote: Compressing objects: 100% (13112/13112), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/41991) Receiving objects: 1% (420/41991) Receiving objects: 2% (840/41991) Receiving objects: 3% (1260/41991) Receiving objects: 4% (1680/41991) Receiving objects: 5% (2100/41991) Receiving objects: 6% (2520/41991) Receiving objects: 7% (2940/41991) Receiving objects: 8% (3360/41991) Receiving objects: 9% (3780/41991) Receiving objects: 10% (4200/41991) Receiving objects: 11% (4620/41991) Receiving objects: 12% (5039/41991) Receiving objects: 13% (5459/41991) Receiving objects: 14% (5879/41991) Receiving objects: 15% (6299/41991) Receiving objects: 16% (6719/41991) Receiving objects: 17% (7139/41991) Receiving objects: 18% (7559/41991) Receiving objects: 19% (7979/41991) Receiving objects: 20% (8399/41991) Receiving objects: 21% (8819/41991) Receiving objects: 22% (9239/41991) Receiving objects: 23% (9658/41991) Receiving objects: 24% (10078/41991) Receiving objects: 25% (10498/41991) Receiving objects: 26% (10918/41991) Receiving objects: 27% (11338/41991) Receiving objects: 28% (11758/41991) Receiving objects: 29% (12178/41991) Receiving objects: 30% (12598/41991) Receiving objects: 31% (13018/41991) Receiving objects: 32% (13438/41991) Receiving objects: 33% (13858/41991) Receiving objects: 34% (14277/41991) Receiving objects: 35% (14697/41991) Receiving objects: 36% (15117/41991) Receiving objects: 37% (15537/41991) Receiving objects: 38% (15957/41991) Receiving objects: 39% (16377/41991) Receiving objects: 40% (16797/41991) Receiving objects: 41% (17217/41991) Receiving objects: 42% (17637/41991) Receiving objects: 43% (18057/41991) Receiving objects: 44% (18477/41991) Receiving objects: 45% (18896/41991) Receiving objects: 46% (19316/41991) Receiving objects: 47% (19736/41991) Receiving objects: 48% (20156/41991) Receiving objects: 49% (20576/41991) Receiving objects: 50% (20996/41991) Receiving objects: 51% (21416/41991) Receiving objects: 52% (21836/41991) Receiving objects: 53% (22256/41991) Receiving objects: 54% (22676/41991) Receiving objects: 55% (23096/41991) Receiving objects: 56% (23515/41991) Receiving objects: 57% (23935/41991) Receiving objects: 58% (24355/41991) Receiving objects: 59% (24775/41991) Receiving objects: 60% (25195/41991) Receiving objects: 61% (25615/41991) Receiving objects: 62% (26035/41991) Receiving objects: 63% (26455/41991) Receiving objects: 64% (26875/41991) Receiving objects: 65% (27295/41991) Receiving objects: 66% (27715/41991) Receiving objects: 67% (28134/41991) Receiving objects: 68% (28554/41991) Receiving objects: 69% (28974/41991) Receiving objects: 70% (29394/41991) Receiving objects: 71% (29814/41991) Receiving objects: 72% (30234/41991) Receiving objects: 73% (30654/41991) Receiving objects: 74% (31074/41991) Receiving objects: 75% (31494/41991) Receiving objects: 76% (31914/41991) Receiving objects: 77% (32334/41991) Receiving objects: 78% (32753/41991) Receiving objects: 79% (33173/41991) Receiving objects: 80% (33593/41991) Receiving objects: 81% (34013/41991) Receiving objects: 82% (34433/41991) Receiving objects: 83% (34853/41991) Receiving objects: 84% (35273/41991) Receiving objects: 85% (35693/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 86% (36113/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 87% (36533/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 88% (36953/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 89% (37372/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 90% (37792/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 91% (38212/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 92% (38632/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 93% (39052/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 94% (39472/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 95% (39892/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 96% (40312/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 97% (40732/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 98% (41152/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 99% (41572/41991), 14.78 MiB | 29.55 MiB/s remote: Total 41991 (delta 28219), reused 40765 (delta 27834), pack-reused 0 Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (41991/41991), 14.78 MiB | 29.55 MiB/s Receiving objects: 100% (41991/41991), 19.08 MiB | 28.68 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/28219) Resolving deltas: 1% (325/28219) Resolving deltas: 2% (586/28219) Resolving deltas: 3% (850/28219) Resolving deltas: 6% (1733/28219) Resolving deltas: 7% (1976/28219) Resolving deltas: 8% (2261/28219) Resolving deltas: 9% (2621/28219) Resolving deltas: 10% (3016/28219) Resolving deltas: 11% (3113/28219) Resolving deltas: 12% (3418/28219) Resolving deltas: 13% (3786/28219) Resolving deltas: 14% (3959/28219) Resolving deltas: 15% (4294/28219) Resolving deltas: 16% (4559/28219) Resolving deltas: 17% (4806/28219) Resolving deltas: 18% (5102/28219) Resolving deltas: 19% (5481/28219) Resolving deltas: 20% (5757/28219) Resolving deltas: 22% (6276/28219) Resolving deltas: 23% (6573/28219) Resolving deltas: 24% (6808/28219) Resolving deltas: 25% (7162/28219) Resolving deltas: 26% (7530/28219) Resolving deltas: 28% (8170/28219) Resolving deltas: 29% (8227/28219) Resolving deltas: 30% (8468/28219) Resolving deltas: 31% (8792/28219) Resolving deltas: 32% (9167/28219) Resolving deltas: 33% (9316/28219) Resolving deltas: 34% (9665/28219) Resolving deltas: 35% (9901/28219) Resolving deltas: 36% (10179/28219) Resolving deltas: 37% (10603/28219) Resolving deltas: 38% (10726/28219) Resolving deltas: 39% (11038/28219) Resolving deltas: 40% (11296/28219) Resolving deltas: 41% (11580/28219) Resolving deltas: 42% (11862/28219) Resolving deltas: 43% (12142/28219) Resolving deltas: 44% (12435/28219) Resolving deltas: 45% (12707/28219) Resolving deltas: 46% (12983/28219) Resolving deltas: 47% (13268/28219) Resolving deltas: 48% (13554/28219) Resolving deltas: 49% (13830/28219) Resolving deltas: 50% (14112/28219) Resolving deltas: 51% (14397/28219) Resolving deltas: 52% (14697/28219) Resolving deltas: 53% (14961/28219) Resolving deltas: 54% (15247/28219) Resolving deltas: 55% (15529/28219) Resolving deltas: 56% (15804/28219) Resolving deltas: 57% (16090/28219) Resolving deltas: 58% (16373/28219) Resolving deltas: 59% (16653/28219) Resolving deltas: 60% (16946/28219) Resolving deltas: 61% (17227/28219) Resolving deltas: 62% (17504/28219) Resolving deltas: 63% (17809/28219) Resolving deltas: 64% (18090/28219) Resolving deltas: 65% (18350/28219) Resolving deltas: 66% (18637/28219) Resolving deltas: 67% (18932/28219) Resolving deltas: 68% (19192/28219) Resolving deltas: 69% (19478/28219) Resolving deltas: 70% (19754/28219) Resolving deltas: 71% (20043/28219) Resolving deltas: 72% (20388/28219) Resolving deltas: 73% (20629/28219) Resolving deltas: 74% (20889/28219) Resolving deltas: 75% (21181/28219) Resolving deltas: 76% (21490/28219) Resolving deltas: 77% (21745/28219) Resolving deltas: 78% (22051/28219) Resolving deltas: 79% (22299/28219) Resolving deltas: 80% (22585/28219) Resolving deltas: 81% (22909/28219) Resolving deltas: 82% (23151/28219) Resolving deltas: 83% (23488/28219) Resolving deltas: 84% (23710/28219) Resolving deltas: 85% (23989/28219) Resolving deltas: 86% (24283/28219) Resolving deltas: 87% (24558/28219) Resolving deltas: 88% (24856/28219) Resolving deltas: 89% (25119/28219) Resolving deltas: 90% (25398/28219) Resolving deltas: 91% (25682/28219) Resolving deltas: 92% (25962/28219) Resolving deltas: 93% (26248/28219) Resolving deltas: 94% (26528/28219) Resolving deltas: 95% (26810/28219) Resolving deltas: 96% (27141/28219) Resolving deltas: 97% (27386/28219) Resolving deltas: 98% (27696/28219) Resolving deltas: 99% (27939/28219) Resolving deltas: 100% (28219/28219) Resolving deltas: 100% (28219/28219), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.12-2-ga9833ff3 -X main.version=1.1.12+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=2c7520d.m -X github.com/containerd/containerd/v2/version.Revision=2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=2c7520d.m -X github.com/containerd/containerd/v2/version.Revision=2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=2c7520d.m -X github.com/containerd/containerd/v2/version.Revision=2c7520d6eb0c4906f0e23c2c045a06121ebb8c0a.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*data' compile_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegNoTearDownWithDownload(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerNoTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerWithTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 81271cf7a52d: Already exists Step #4: 076e7ea7d2be: Already exists Step #4: 31dcf48b8b3c: Pulling fs layer Step #4: 7d0504eb26f4: Pulling fs layer Step #4: 8155837b9b6e: Pulling fs layer Step #4: b981ea28643a: Pulling fs layer Step #4: 0d80090e4d10: Pulling fs layer Step #4: 40df21b34b6e: Pulling fs layer Step #4: d77fafe1f614: Pulling fs layer Step #4: 170e46022092: Pulling fs layer Step #4: 1f9826e811f7: Pulling fs layer Step #4: fa8f1fe6cbd5: Pulling fs layer Step #4: 8d2b0d37b71a: Pulling fs layer Step #4: 1a5430d9da5c: Pulling fs layer Step #4: 6da9817935dd: Pulling fs layer Step #4: 11beb6e5e983: Pulling fs layer Step #4: 40df21b34b6e: Waiting Step #4: d77fafe1f614: Waiting Step #4: 170e46022092: Waiting Step #4: 1f9826e811f7: Waiting Step #4: fa8f1fe6cbd5: Waiting Step #4: b981ea28643a: Waiting Step #4: 0d80090e4d10: Waiting Step #4: 8d2b0d37b71a: Waiting Step #4: 1a5430d9da5c: Waiting Step #4: 11beb6e5e983: Waiting Step #4: 6da9817935dd: Waiting Step #4: 8155837b9b6e: Verifying Checksum Step #4: 8155837b9b6e: Download complete Step #4: 31dcf48b8b3c: Verifying Checksum Step #4: 31dcf48b8b3c: Download complete Step #4: 7d0504eb26f4: Verifying Checksum Step #4: 7d0504eb26f4: Download complete Step #4: 40df21b34b6e: Download complete Step #4: d77fafe1f614: Verifying Checksum Step #4: d77fafe1f614: Download complete Step #4: 31dcf48b8b3c: Pull complete Step #4: 0d80090e4d10: Verifying Checksum Step #4: 0d80090e4d10: Download complete Step #4: 1f9826e811f7: Verifying Checksum Step #4: 1f9826e811f7: Download complete Step #4: 170e46022092: Download complete Step #4: 7d0504eb26f4: Pull complete Step #4: 8d2b0d37b71a: Verifying Checksum Step #4: 8d2b0d37b71a: Download complete Step #4: 1a5430d9da5c: Download complete Step #4: 8155837b9b6e: Pull complete Step #4: b981ea28643a: Verifying Checksum Step #4: b981ea28643a: Download complete Step #4: 11beb6e5e983: Download complete Step #4: fa8f1fe6cbd5: Verifying Checksum Step #4: fa8f1fe6cbd5: Download complete Step #4: 6da9817935dd: Verifying Checksum Step #4: 6da9817935dd: Download complete Step #4: b981ea28643a: Pull complete Step #4: 0d80090e4d10: Pull complete Step #4: 40df21b34b6e: Pull complete Step #4: d77fafe1f614: Pull complete Step #4: 170e46022092: Pull complete Step #4: 1f9826e811f7: Pull complete Step #4: fa8f1fe6cbd5: Pull complete Step #4: 8d2b0d37b71a: Pull complete Step #4: 1a5430d9da5c: Pull complete Step #4: 6da9817935dd: Pull complete Step #4: 11beb6e5e983: Pull complete Step #4: Digest: sha256:7675d12c9093c87bf4cb1b9f9b6ec584eddf024f0dedde02cc1944f2d5b8b5e5 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_FuzzCRIServer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzCRIServer.zip or Step #5: /corpus/fuzz_FuzzCRIServer.zip.zip, and cannot find /corpus/fuzz_FuzzCRIServer.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzCRIServer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_FuzzContainerdImport.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzContainerdImport.zip or Step #5: /corpus/fuzz_FuzzContainerdImport.zip.zip, and cannot find /corpus/fuzz_FuzzContainerdImport.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzContainerdImport. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/fuzz_FuzzIntegNoTearDownWithDownload.zip]: zipfile is empty Step #5: Failed to unpack the corpus for fuzz_FuzzIntegNoTearDownWithDownload. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerdImport Step #5: cp: cannot stat '/corpus/fuzz_FuzzContainerdImport/': No such file or directory Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzLeaseManager Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffApply Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzApply Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2024/02/12 06:43:12 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: Running go target fuzz_FuzzFetcher Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzCSWalk Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImportIndex Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: Running go target fuzz_FuzzUUIDParse Step #5: Running go target fuzz_FuzzParseAuth Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzConvertManifest Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: cp: cannot stat '/corpus/fuzz_FuzzIntegNoTearDownWithDownload/': No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImagesCheck Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: 2024/02/12 06:43:17 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzFiltersParse Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: Running go target fuzz_FuzzDecompressStream Step #5: Running go target fuzz_FuzzArchiveExport Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzDiffApply: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.00s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/00cd3a5ccb687152bd5a6eb27d8183901f7008cc context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/00cd3a5ccb687152bd5a6eb27d8183901f7008cc non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.1% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzParseAuth: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzParseAuth/003f4fe9a6a6854b689166333f510b9bcdac64eb context deadline exceeded Step #5: FAIL Step #5: coverage: 3.5% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzContentStore Step #5: Running go target fuzz_FuzzExchange Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffCompare Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2024/02/12 06:43:29 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: Running go target fuzz_FuzzCRIServer Step #5: cp: cannot stat '/corpus/fuzz_FuzzCRIServer/': No such file or directory Step #5: Running go target fuzz_FuzzImageStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzUUIDParse: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.00s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzUUIDParse/006d8f45f4cf7e98c4837fc00d3f50dd44c85dcb context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzUUIDParse/006d8f45f4cf7e98c4837fc00d3f50dd44c85dcb non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.8% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImagesCheck: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/012956e307e4fecd934c1d2074595e0b1dcb39ab context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/012956e307e4fecd934c1d2074595e0b1dcb39ab non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.6% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzLeaseManager: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/0035be6672b65ac08157ccac3570f8ebfa50cfa5 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/0035be6672b65ac08157ccac3570f8ebfa50cfa5 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.3% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzExchange: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/001679bdd36dc5dfee2869590d457409dac18c0c context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/001679bdd36dc5dfee2869590d457409dac18c0c non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.5% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzDiffCompare: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffCompare/002cd3589a40d4490390fd3450b9e577c1bb63a4 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffCompare/002cd3589a40d4490390fd3450b9e577c1bb63a4 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.1% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImageStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.02s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/002c940f0a9124104a057fb09579deb484be10f5 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/002c940f0a9124104a057fb09579deb484be10f5 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.7% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContentStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/00e53913a17de158ef00ee8296e07c986cbb4f15 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/00e53913a17de158ef00ee8296e07c986cbb4f15 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.0% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzArchiveExport: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzArchiveExport/00185fc2d0d5c264ee60ab77ea197c720a264da8 context deadline exceeded Step #5: FAIL Step #5: coverage: 3.5% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContainerStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002df450d361e417f68a87b3d4c2211b773f8f41 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002df450d361e417f68a87b3d4c2211b773f8f41 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.3% of statements in github.com/containerd/containerd/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2024/02/12 06:45:39 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzCRIServer.perf.cpu.prof": parsing profile: empty input file Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 12.0 MiB] 0% Done / [0/4 files][ 0.0 B/ 12.0 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/4 files][ 0.0 B/ 12.0 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 12.0 MiB] 0% Done / [1/4 files][176.3 KiB/ 12.0 MiB] 1% Done / [2/4 files][ 12.0 MiB/ 12.0 MiB] 99% Done / [3/4 files][ 12.0 MiB/ 12.0 MiB] 99% Done / [4/4 files][ 12.0 MiB/ 12.0 MiB] 100% Done Step #7: Operation completed over 4 objects/12.0 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzUUIDParse.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.7 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [0/30 files][269.4 KiB/ 3.7 MiB] 7% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: / [0/30 files][496.4 KiB/ 3.7 MiB] 13% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: / [0/30 files][517.5 KiB/ 3.7 MiB] 13% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: / [0/30 files][517.5 KiB/ 3.7 MiB] 13% Done / [1/30 files][517.5 KiB/ 3.7 MiB] 13% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [1/30 files][517.5 KiB/ 3.7 MiB] 13% Done / [2/30 files][517.5 KiB/ 3.7 MiB] 13% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: / [2/30 files][ 1.4 MiB/ 3.7 MiB] 37% Done / [3/30 files][ 1.4 MiB/ 3.7 MiB] 37% Done / [4/30 files][ 1.9 MiB/ 3.7 MiB] 50% Done / [5/30 files][ 1.9 MiB/ 3.7 MiB] 50% Done / [6/30 files][ 1.9 MiB/ 3.7 MiB] 50% Done / [7/30 files][ 1.9 MiB/ 3.7 MiB] 50% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [7/30 files][ 2.1 MiB/ 3.7 MiB] 56% Done / [8/30 files][ 2.1 MiB/ 3.7 MiB] 56% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [8/30 files][ 2.1 MiB/ 3.7 MiB] 56% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [8/30 files][ 2.1 MiB/ 3.7 MiB] 56% Done / [9/30 files][ 2.1 MiB/ 3.7 MiB] 56% Done / [10/30 files][ 2.3 MiB/ 3.7 MiB] 63% Done / [11/30 files][ 2.3 MiB/ 3.7 MiB] 63% Done / [12/30 files][ 2.3 MiB/ 3.7 MiB] 63% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [12/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [12/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done / [13/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done / [14/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: / [14/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [14/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done / [14/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: / [14/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done / [15/30 files][ 2.6 MiB/ 3.7 MiB] 69% Done / [16/30 files][ 2.8 MiB/ 3.7 MiB] 75% Done / [17/30 files][ 2.8 MiB/ 3.7 MiB] 75% Done / [18/30 files][ 2.8 MiB/ 3.7 MiB] 75% Done / [19/30 files][ 3.4 MiB/ 3.7 MiB] 93% Done / [20/30 files][ 3.4 MiB/ 3.7 MiB] 93% Done / [21/30 files][ 3.4 MiB/ 3.7 MiB] 93% Done / [22/30 files][ 3.4 MiB/ 3.7 MiB] 93% Done / [23/30 files][ 3.4 MiB/ 3.7 MiB] 93% Done - - [24/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [25/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [26/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [27/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [28/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [29/30 files][ 3.7 MiB/ 3.7 MiB] 99% Done - [30/30 files][ 3.7 MiB/ 3.7 MiB] 100% Done Step #9: Operation completed over 30 objects/3.7 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 633.0 B/ 7.5 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 668.0 B/ 7.5 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 1.5 KiB/ 7.5 KiB] 19% Done / [0/29 files][ 1.5 KiB/ 7.5 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 1.9 KiB/ 7.5 KiB] 25% Done / [1/29 files][ 1.9 KiB/ 7.5 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 3.0 KiB/ 7.5 KiB] 40% Done / [2/29 files][ 3.0 KiB/ 7.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [2/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done / [3/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done / [4/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done / [5/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done / [5/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 3.6 KiB/ 7.5 KiB] 48% Done / [6/29 files][ 3.9 KiB/ 7.5 KiB] 51% Done / [7/29 files][ 4.0 KiB/ 7.5 KiB] 52% Done / [8/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done / [9/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done / [10/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzUUIDParse.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done / [11/29 files][ 4.7 KiB/ 7.5 KiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [12/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: / [13/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [13/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [14/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [14/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [15/29 files][ 5.2 KiB/ 7.5 KiB] 68% Done / [16/29 files][ 6.2 KiB/ 7.5 KiB] 81% Done / [17/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [17/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [17/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [17/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done / [18/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: / [18/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done / [19/29 files][ 6.6 KiB/ 7.5 KiB] 87% Done / [20/29 files][ 7.1 KiB/ 7.5 KiB] 94% Done / [21/29 files][ 7.2 KiB/ 7.5 KiB] 96% Done - - [22/29 files][ 7.4 KiB/ 7.5 KiB] 98% Done - [23/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [24/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [25/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [26/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [27/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [28/29 files][ 7.5 KiB/ 7.5 KiB] 99% Done - [29/29 files][ 7.5 KiB/ 7.5 KiB] 100% Done Step #11: Operation completed over 29 objects/7.5 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1558 --:--:-- --:--:-- --:--:-- 1558 100 318 0 0 100 318 0 1558 --:--:-- --:--:-- --:--:-- 1558 Finished Step #13 PUSH DONE