starting build "2b169d29-8373-46bc-a60c-7f6d29296791" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: f2fcf2e227f4: Pulling fs layer Step #1: da477cd879f9: Pulling fs layer Step #1: f9c33016fb16: Pulling fs layer Step #1: 72e497f44a0a: Pulling fs layer Step #1: 807e7e92d553: Pulling fs layer Step #1: 2af538ff64cc: Pulling fs layer Step #1: e2bfef62f127: Pulling fs layer Step #1: bdfc2f43ab22: Pulling fs layer Step #1: 1a2d9435b89f: Pulling fs layer Step #1: 5cfc952b9aa0: Pulling fs layer Step #1: f2cd263c35de: Pulling fs layer Step #1: 113ebc8c163b: Pulling fs layer Step #1: 2e86ff9de0ba: Pulling fs layer Step #1: 654ee72fcad0: Pulling fs layer Step #1: 01af52a281bc: Pulling fs layer Step #1: 81351a185085: Pulling fs layer Step #1: 73f57ed61429: Pulling fs layer Step #1: d3d6171212b0: Pulling fs layer Step #1: aa652db7a318: Pulling fs layer Step #1: 72e497f44a0a: Waiting Step #1: 2d902074596f: Pulling fs layer Step #1: 807e7e92d553: Waiting Step #1: ab7266ccacca: Pulling fs layer Step #1: 45a7b69c6c74: Pulling fs layer Step #1: bdfc2f43ab22: Waiting Step #1: 93feae40aef9: Pulling fs layer Step #1: 20b774d80b34: Pulling fs layer Step #1: 2541c6de8817: Pulling fs layer Step #1: 2af538ff64cc: Waiting Step #1: b9010161076d: Pulling fs layer Step #1: 0cf7f9d06e95: Pulling fs layer Step #1: e2bfef62f127: Waiting Step #1: 1a2d9435b89f: Waiting Step #1: aa652db7a318: Waiting Step #1: 94434788ccac: Pulling fs layer Step #1: 5be98e82b487: Pulling fs layer Step #1: efee6427d7c0: Pulling fs layer Step #1: 14f059fa46b4: Pulling fs layer Step #1: ae8207872fc7: Pulling fs layer Step #1: 7bae4c228cf7: Pulling fs layer Step #1: 4bfe8d0fd649: Pulling fs layer Step #1: 93feae40aef9: Waiting Step #1: 20b774d80b34: Waiting Step #1: 01af52a281bc: Waiting Step #1: 81351a185085: Waiting Step #1: 73f57ed61429: Waiting Step #1: 5cfc952b9aa0: Waiting Step #1: f9c33016fb16: Waiting Step #1: f2cd263c35de: Waiting Step #1: 2e86ff9de0ba: Waiting Step #1: ab7266ccacca: Waiting Step #1: 654ee72fcad0: Waiting Step #1: d3d6171212b0: Waiting Step #1: 14f059fa46b4: Waiting Step #1: ae8207872fc7: Waiting Step #1: 113ebc8c163b: Waiting Step #1: 4bfe8d0fd649: Waiting Step #1: 45a7b69c6c74: Waiting Step #1: efee6427d7c0: Waiting Step #1: 0cf7f9d06e95: Waiting Step #1: 7bae4c228cf7: Waiting Step #1: da477cd879f9: Verifying Checksum Step #1: da477cd879f9: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 72e497f44a0a: Verifying Checksum Step #1: 72e497f44a0a: Download complete Step #1: f9c33016fb16: Verifying Checksum Step #1: f9c33016fb16: Download complete Step #1: 807e7e92d553: Download complete Step #1: e2bfef62f127: Download complete Step #1: bdfc2f43ab22: Verifying Checksum Step #1: bdfc2f43ab22: Download complete Step #1: f2fcf2e227f4: Verifying Checksum Step #1: f2fcf2e227f4: Download complete Step #1: 5cfc952b9aa0: Verifying Checksum Step #1: 5cfc952b9aa0: Download complete Step #1: b549f31133a9: Pull complete Step #1: f2cd263c35de: Verifying Checksum Step #1: f2cd263c35de: Download complete Step #1: 113ebc8c163b: Verifying Checksum Step #1: 113ebc8c163b: Download complete Step #1: 2e86ff9de0ba: Verifying Checksum Step #1: 2e86ff9de0ba: Download complete Step #1: 654ee72fcad0: Verifying Checksum Step #1: 654ee72fcad0: Download complete Step #1: 01af52a281bc: Verifying Checksum Step #1: 01af52a281bc: Download complete Step #1: 81351a185085: Verifying Checksum Step #1: 81351a185085: Download complete Step #1: 1a2d9435b89f: Verifying Checksum Step #1: 1a2d9435b89f: Download complete Step #1: 73f57ed61429: Verifying Checksum Step #1: 73f57ed61429: Download complete Step #1: aa652db7a318: Verifying Checksum Step #1: aa652db7a318: Download complete Step #1: d3d6171212b0: Verifying Checksum Step #1: d3d6171212b0: Download complete Step #1: 2d902074596f: Verifying Checksum Step #1: 2d902074596f: Download complete Step #1: ab7266ccacca: Verifying Checksum Step #1: ab7266ccacca: Download complete Step #1: 45a7b69c6c74: Verifying Checksum Step #1: 45a7b69c6c74: Download complete Step #1: 93feae40aef9: Verifying Checksum Step #1: 93feae40aef9: Download complete Step #1: 20b774d80b34: Verifying Checksum Step #1: 20b774d80b34: Download complete Step #1: 2541c6de8817: Verifying Checksum Step #1: 2541c6de8817: Download complete Step #1: 2af538ff64cc: Verifying Checksum Step #1: 2af538ff64cc: Download complete Step #1: b9010161076d: Verifying Checksum Step #1: b9010161076d: Download complete Step #1: 0cf7f9d06e95: Verifying Checksum Step #1: 0cf7f9d06e95: Download complete Step #1: 5be98e82b487: Download complete Step #1: 94434788ccac: Download complete Step #1: 14f059fa46b4: Verifying Checksum Step #1: 14f059fa46b4: Download complete Step #1: ae8207872fc7: Verifying Checksum Step #1: ae8207872fc7: Download complete Step #1: 4bfe8d0fd649: Verifying Checksum Step #1: 4bfe8d0fd649: Download complete Step #1: f2fcf2e227f4: Pull complete Step #1: da477cd879f9: Pull complete Step #1: 7bae4c228cf7: Verifying Checksum Step #1: 7bae4c228cf7: Download complete Step #1: f9c33016fb16: Pull complete Step #1: 72e497f44a0a: Pull complete Step #1: 807e7e92d553: Pull complete Step #1: 2af538ff64cc: Pull complete Step #1: e2bfef62f127: Pull complete Step #1: bdfc2f43ab22: Pull complete Step #1: 1a2d9435b89f: Pull complete Step #1: 5cfc952b9aa0: Pull complete Step #1: f2cd263c35de: Pull complete Step #1: 113ebc8c163b: Pull complete Step #1: 2e86ff9de0ba: Pull complete Step #1: 654ee72fcad0: Pull complete Step #1: 01af52a281bc: Pull complete Step #1: 81351a185085: Pull complete Step #1: 73f57ed61429: Pull complete Step #1: d3d6171212b0: Pull complete Step #1: aa652db7a318: Pull complete Step #1: 2d902074596f: Pull complete Step #1: ab7266ccacca: Pull complete Step #1: 45a7b69c6c74: Pull complete Step #1: 93feae40aef9: Pull complete Step #1: 20b774d80b34: Pull complete Step #1: 2541c6de8817: Pull complete Step #1: b9010161076d: Pull complete Step #1: 0cf7f9d06e95: Pull complete Step #1: 94434788ccac: Pull complete Step #1: 5be98e82b487: Pull complete Step #1: efee6427d7c0: Pull complete Step #1: 14f059fa46b4: Pull complete Step #1: ae8207872fc7: Pull complete Step #1: 7bae4c228cf7: Pull complete Step #1: 4bfe8d0fd649: Pull complete Step #1: Digest: sha256:810cc94bd7957d2696edddac456454d5b54e784f3fb9f107fedd49e6f928c8f6 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> ff994b1b366e Step #1: Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1: ---> Running in 0fd812688a03 Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (193 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1: gcc set to manually installed. Step #1: libc6-dev is already the newest version (2.31-0ubuntu9.16). Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: The following additional packages will be installed: Step #1: libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: duperemove seccomp Step #1: The following NEW packages will be installed: Step #1: btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1: liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.2 MB of archives. Step #1: After this operation, 49.1 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.7 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.7 [5944 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.2 MB in 0s (26.1 MB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.7_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package liblzo2-2:amd64. Step #1: Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1: Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1: Selecting previously unselected package btrfs-progs. Step #1: Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1: Unpacking btrfs-progs (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs0:amd64. Step #1: Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs-dev:amd64. Step #1: Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up liblzo2-2:amd64 (2.10-2) ... Step #1: Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up btrfs-progs (5.4.1-2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 0fd812688a03 Step #1: ---> 1f0882483c2c Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1: ---> Running in 190268bbcc49 Step #1: Cloning into 'containerd'... Step #1: Removing intermediate container 190268bbcc49 Step #1: ---> ae44c197deac Step #1: Step 4/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1: ---> Running in 697b53dc1dae Step #1: Cloning into 'instrumentation'... Step #1: Removing intermediate container 697b53dc1dae Step #1: ---> 447480a1a025 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> d5d2f5a7dfa1 Step #1: Step 6/6 : WORKDIR $SRC/containerd Step #1: ---> Running in 9f24076d43f0 Step #1: Removing intermediate container 9f24076d43f0 Step #1: ---> 8ad809f3eebb Step #1: Successfully built 8ad809f3eebb Step #1: Successfully tagged gcr.io/oss-fuzz/containerd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filezcAQeM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a0052d5b1e2db77ee978890722212230fe86c910 Step #2 - "srcmap": + jq_inplace /tmp/filezcAQeM '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "a0052d5b1e2db77ee978890722212230fe86c910" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileuBVdcd Step #2 - "srcmap": + cat /tmp/filezcAQeM Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "a0052d5b1e2db77ee978890722212230fe86c910" }' Step #2 - "srcmap": + mv /tmp/fileuBVdcd /tmp/filezcAQeM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=59ffbf4ce32c71c73627bf0cb3b94587677a0020 Step #2 - "srcmap": + jq_inplace /tmp/filezcAQeM '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "59ffbf4ce32c71c73627bf0cb3b94587677a0020" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file9SjTUJ Step #2 - "srcmap": + cat /tmp/filezcAQeM Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "59ffbf4ce32c71c73627bf0cb3b94587677a0020" }' Step #2 - "srcmap": + mv /tmp/file9SjTUJ /tmp/filezcAQeM Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filezcAQeM Step #2 - "srcmap": + rm /tmp/filezcAQeM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "a0052d5b1e2db77ee978890722212230fe86c910" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "59ffbf4ce32c71c73627bf0cb3b94587677a0020" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-coverage-x86_64": + go run main.go --target_dir /src/containerd/images Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Connecting to security.ubuntu.com (185.125.190.81)] Hit:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Connecting to security.ubuntu.com (185.125.190.81)] Hit:3 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] Hit:4 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Working] 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 30% Reading package lists... 30% Reading package lists... 34% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 54% Reading package lists... 54% Reading package lists... 57% Reading package lists... 57% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 71% Reading package lists... 71% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 83% Reading package lists... 83% Reading package lists... 85% Reading package lists... 85% Reading package lists... 85% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 30% Reading package lists... 30% Reading package lists... 34% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 54% Reading package lists... 54% Reading package lists... 57% Reading package lists... 57% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 71% Reading package lists... 71% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 83% Reading package lists... 83% Reading package lists... 85% Reading package lists... 85% Reading package lists... 85% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.20.3-1ubuntu2.1). Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.23.1.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.23.1.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.27.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.12.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.67.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.32.0-alpha.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/otelttrpc v0.0.0-20240305015340-ea5083fda723 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/vsock v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubelet v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.29.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v7 v7.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/checkpointctl v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/imgcrypt v1.2.0-rc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containers/ocicrypt v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.31.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231214170342-aacd6d4b4611 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stefanberger/go-pkcs11uri v0.0.0-20201008174630-78d3cae3a980 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mozilla.org/pkcs7 v0.0.0-20200128120323-432b2356ecb1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240903143218-8af14fe29dc1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.33.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20240525223248-4bfdf5a9a2af Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer.go:func FuzzLoadDefaultProfile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/apparmor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzImportIndex(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzzer.go:func FuzzContainerdImport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzCSWalk(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzArchiveExport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_fuzzer.go:func FuzzParseAuth(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzzer.go:func FuzzCRIServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffCompare(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzzer.go:func FuzzExchange(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/fuzz_images.go:func FuzzImagesCheck(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzImageStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzLeaseManager(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContainerStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContentStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/uuid_fuzzer.go:func FuzzUUIDParse(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzUUIDParse fuzz_FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_internal.go:func FuzzParseHostsFile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker/config: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz.go:func FuzzConvertManifest(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz.go:func FuzzFetcher(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer.go:func FuzzDecompressStream(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/pkg/archive/compression: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzzer.go:func FuzzContentStoreWriter(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/plugins/content/local: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 43778, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/11732) remote: Counting objects: 1% (118/11732) remote: Counting objects: 2% (235/11732) remote: Counting objects: 3% (352/11732) remote: Counting objects: 4% (470/11732) remote: Counting objects: 5% (587/11732) remote: Counting objects: 6% (704/11732) remote: Counting objects: 7% (822/11732) remote: Counting objects: 8% (939/11732) remote: Counting objects: 9% (1056/11732) remote: Counting objects: 10% (1174/11732) remote: Counting objects: 11% (1291/11732) remote: Counting objects: 12% (1408/11732) remote: Counting objects: 13% (1526/11732) remote: Counting objects: 14% (1643/11732) remote: Counting objects: 15% (1760/11732) remote: Counting objects: 16% (1878/11732) remote: Counting objects: 17% (1995/11732) remote: Counting objects: 18% (2112/11732) remote: Counting objects: 19% (2230/11732) remote: Counting objects: 20% (2347/11732) remote: Counting objects: 21% (2464/11732) remote: Counting objects: 22% (2582/11732) remote: Counting objects: 23% (2699/11732) remote: Counting objects: 24% (2816/11732) remote: Counting objects: 25% (2933/11732) remote: Counting objects: 26% (3051/11732) remote: Counting objects: 27% (3168/11732) remote: Counting objects: 28% (3285/11732) remote: Counting objects: 29% (3403/11732) remote: Counting objects: 30% (3520/11732) remote: Counting objects: 31% (3637/11732) remote: Counting objects: 32% (3755/11732) remote: Counting objects: 33% (3872/11732) remote: Counting objects: 34% (3989/11732) remote: Counting objects: 35% (4107/11732) remote: Counting objects: 36% (4224/11732) remote: Counting objects: 37% (4341/11732) remote: Counting objects: 38% (4459/11732) remote: Counting objects: 39% (4576/11732) remote: Counting objects: 40% (4693/11732) remote: Counting objects: 41% (4811/11732) remote: Counting objects: 42% (4928/11732) remote: Counting objects: 43% (5045/11732) remote: Counting objects: 44% (5163/11732) remote: Counting objects: 45% (5280/11732) remote: Counting objects: 46% (5397/11732) remote: Counting objects: 47% (5515/11732) remote: Counting objects: 48% (5632/11732) remote: Counting objects: 49% (5749/11732) remote: Counting objects: 50% (5866/11732) remote: Counting objects: 51% (5984/11732) remote: Counting objects: 52% (6101/11732) remote: Counting objects: 53% (6218/11732) remote: Counting objects: 54% (6336/11732) remote: Counting objects: 55% (6453/11732) remote: Counting objects: 56% (6570/11732) remote: Counting objects: 57% (6688/11732) remote: Counting objects: 58% (6805/11732) remote: Counting objects: 59% (6922/11732) remote: Counting objects: 60% (7040/11732) remote: Counting objects: 61% (7157/11732) remote: Counting objects: 62% (7274/11732) remote: Counting objects: 63% (7392/11732) remote: Counting objects: 64% (7509/11732) remote: Counting objects: 65% (7626/11732) remote: Counting objects: 66% (7744/11732) remote: Counting objects: 67% (7861/11732) remote: Counting objects: 68% (7978/11732) remote: Counting objects: 69% (8096/11732) remote: Counting objects: 70% (8213/11732) remote: Counting objects: 71% (8330/11732) remote: Counting objects: 72% (8448/11732) remote: Counting objects: 73% (8565/11732) remote: Counting objects: 74% (8682/11732) remote: Counting objects: 75% (8799/11732) remote: Counting objects: 76% (8917/11732) remote: Counting objects: 77% (9034/11732) remote: Counting objects: 78% (9151/11732) remote: Counting objects: 79% (9269/11732) remote: Counting objects: 80% (9386/11732) remote: Counting objects: 81% (9503/11732) remote: Counting objects: 82% (9621/11732) remote: Counting objects: 83% (9738/11732) remote: Counting objects: 84% (9855/11732) remote: Counting objects: 85% (9973/11732) remote: Counting objects: 86% (10090/11732) remote: Counting objects: 87% (10207/11732) remote: Counting objects: 88% (10325/11732) remote: Counting objects: 89% (10442/11732) remote: Counting objects: 90% (10559/11732) remote: Counting objects: 91% (10677/11732) remote: Counting objects: 92% (10794/11732) remote: Counting objects: 93% (10911/11732) remote: Counting objects: 94% (11029/11732) remote: Counting objects: 95% (11146/11732) remote: Counting objects: 96% (11263/11732) remote: Counting objects: 97% (11381/11732) remote: Counting objects: 98% (11498/11732) remote: Counting objects: 99% (11615/11732) remote: Counting objects: 100% (11732/11732) remote: Counting objects: 100% (11732/11732), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 0% (1/1065) remote: Compressing objects: 1% (11/1065) remote: Compressing objects: 2% (22/1065) remote: Compressing objects: 3% (32/1065) remote: Compressing objects: 4% (43/1065) remote: Compressing objects: 5% (54/1065) remote: Compressing objects: 6% (64/1065) remote: Compressing objects: 7% (75/1065) remote: Compressing objects: 8% (86/1065) remote: Compressing objects: 9% (96/1065) remote: Compressing objects: 10% (107/1065) remote: Compressing objects: 11% (118/1065) remote: Compressing objects: 12% (128/1065) remote: Compressing objects: 13% (139/1065) remote: Compressing objects: 14% (150/1065) remote: Compressing objects: 15% (160/1065) remote: Compressing objects: 16% (171/1065) remote: Compressing objects: 17% (182/1065) remote: Compressing objects: 18% (192/1065) remote: Compressing objects: 19% (203/1065) remote: Compressing objects: 20% (213/1065) remote: Compressing objects: 21% (224/1065) remote: Compressing objects: 22% (235/1065) remote: Compressing objects: 23% (245/1065) remote: Compressing objects: 24% (256/1065) remote: Compressing objects: 25% (267/1065) remote: Compressing objects: 26% (277/1065) remote: Compressing objects: 27% (288/1065) remote: Compressing objects: 28% (299/1065) remote: Compressing objects: 29% (309/1065) remote: Compressing objects: 30% (320/1065) remote: Compressing objects: 31% (331/1065) remote: Compressing objects: 32% (341/1065) remote: Compressing objects: 33% (352/1065) remote: Compressing objects: 34% (363/1065) remote: Compressing objects: 35% (373/1065) remote: Compressing objects: 36% (384/1065) remote: Compressing objects: 37% (395/1065) remote: Compressing objects: 38% (405/1065) remote: Compressing objects: 39% (416/1065) remote: Compressing objects: 40% (426/1065) remote: Compressing objects: 41% (437/1065) remote: Compressing objects: 42% (448/1065) remote: Compressing objects: 43% (458/1065) remote: Compressing objects: 44% (469/1065) remote: Compressing objects: 45% (480/1065) remote: Compressing objects: 46% (490/1065) remote: Compressing objects: 47% (501/1065) remote: Compressing objects: 48% (512/1065) remote: Compressing objects: 49% (522/1065) remote: Compressing objects: 50% (533/1065) remote: Compressing objects: 51% (544/1065) remote: Compressing objects: 52% (554/1065) remote: Compressing objects: 53% (565/1065) remote: Compressing objects: 54% (576/1065) remote: Compressing objects: 55% (586/1065) remote: Compressing objects: 56% (597/1065) remote: Compressing objects: 57% (608/1065) remote: Compressing objects: 58% (618/1065) remote: Compressing objects: 59% (629/1065) remote: Compressing objects: 60% (639/1065) remote: Compressing objects: 61% (650/1065) remote: Compressing objects: 62% (661/1065) remote: Compressing objects: 63% (671/1065) remote: Compressing objects: 64% (682/1065) remote: Compressing objects: 65% (693/1065) remote: Compressing objects: 66% (703/1065) remote: Compressing objects: 67% (714/1065) remote: Compressing objects: 68% (725/1065) remote: Compressing objects: 69% (735/1065) remote: Compressing objects: 70% (746/1065) remote: Compressing objects: 71% (757/1065) remote: Compressing objects: 72% (767/1065) remote: Compressing objects: 73% (778/1065) remote: Compressing objects: 74% (789/1065) remote: Compressing objects: 75% (799/1065) remote: Compressing objects: 76% (810/1065) remote: Compressing objects: 77% (821/1065) remote: Compressing objects: 78% (831/1065) remote: Compressing objects: 79% (842/1065) remote: Compressing objects: 80% (852/1065) remote: Compressing objects: 81% (863/1065) remote: Compressing objects: 82% (874/1065) remote: Compressing objects: 83% (884/1065) remote: Compressing objects: 84% (895/1065) remote: Compressing objects: 85% (906/1065) remote: Compressing objects: 86% (916/1065) remote: Compressing objects: 87% (927/1065) remote: Compressing objects: 88% (938/1065) remote: Compressing objects: 89% (948/1065) remote: Compressing objects: 90% (959/1065) remote: Compressing objects: 91% (970/1065) remote: Compressing objects: 92% (980/1065) remote: Compressing objects: 93% (991/1065) remote: Compressing objects: 94% (1002/1065) remote: Compressing objects: 95% (1012/1065) remote: Compressing objects: 96% (1023/1065) remote: Compressing objects: 97% (1034/1065) remote: Compressing objects: 98% (1044/1065) remote: Compressing objects: 99% (1055/1065) remote: Compressing objects: 100% (1065/1065) remote: Compressing objects: 100% (1065/1065), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/43778) Receiving objects: 1% (438/43778) Receiving objects: 2% (876/43778) Receiving objects: 3% (1314/43778) Receiving objects: 4% (1752/43778) Receiving objects: 5% (2189/43778) Receiving objects: 6% (2627/43778) Receiving objects: 7% (3065/43778) Receiving objects: 8% (3503/43778) Receiving objects: 9% (3941/43778) Receiving objects: 10% (4378/43778) Receiving objects: 11% (4816/43778) Receiving objects: 12% (5254/43778) Receiving objects: 13% (5692/43778) Receiving objects: 14% (6129/43778) Receiving objects: 15% (6567/43778) Receiving objects: 16% (7005/43778) Receiving objects: 17% (7443/43778) Receiving objects: 18% (7881/43778) Receiving objects: 19% (8318/43778) Receiving objects: 20% (8756/43778) Receiving objects: 21% (9194/43778) Receiving objects: 22% (9632/43778) Receiving objects: 23% (10069/43778) Receiving objects: 24% (10507/43778) Receiving objects: 25% (10945/43778) Receiving objects: 26% (11383/43778) Receiving objects: 27% (11821/43778) Receiving objects: 28% (12258/43778) Receiving objects: 29% (12696/43778) Receiving objects: 30% (13134/43778) Receiving objects: 31% (13572/43778) Receiving objects: 32% (14009/43778) Receiving objects: 33% (14447/43778) Receiving objects: 34% (14885/43778) Receiving objects: 35% (15323/43778) Receiving objects: 36% (15761/43778) Receiving objects: 37% (16198/43778) Receiving objects: 38% (16636/43778) Receiving objects: 39% (17074/43778) Receiving objects: 40% (17512/43778) Receiving objects: 41% (17949/43778) Receiving objects: 42% (18387/43778) Receiving objects: 43% (18825/43778) Receiving objects: 44% (19263/43778) Receiving objects: 45% (19701/43778) Receiving objects: 46% (20138/43778) Receiving objects: 47% (20576/43778) Receiving objects: 48% (21014/43778) Receiving objects: 49% (21452/43778) Receiving objects: 50% (21889/43778) Receiving objects: 51% (22327/43778) Receiving objects: 52% (22765/43778) Receiving objects: 53% (23203/43778) Receiving objects: 54% (23641/43778) Receiving objects: 55% (24078/43778) Receiving objects: 56% (24516/43778) Receiving objects: 57% (24954/43778) Receiving objects: 58% (25392/43778) Receiving objects: 59% (25830/43778) Receiving objects: 60% (26267/43778) Receiving objects: 61% (26705/43778) Receiving objects: 62% (27143/43778) Receiving objects: 63% (27581/43778) Receiving objects: 64% (28018/43778) Receiving objects: 65% (28456/43778) Receiving objects: 66% (28894/43778) Receiving objects: 67% (29332/43778) Receiving objects: 68% (29770/43778) Receiving objects: 69% (30207/43778) Receiving objects: 70% (30645/43778) Receiving objects: 71% (31083/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 72% (31521/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 73% (31958/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 74% (32396/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 75% (32834/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 76% (33272/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 77% (33710/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 78% (34147/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 79% (34585/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 80% (35023/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 81% (35461/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 82% (35898/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 83% (36336/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 84% (36774/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 85% (37212/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 86% (37650/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 87% (38087/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 88% (38525/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 89% (38963/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 90% (39401/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 91% (39838/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 92% (40276/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 93% (40714/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 94% (41152/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 95% (41590/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 96% (42027/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 97% (42465/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 98% (42903/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 99% (43341/43778), 13.07 MiB | 26.14 MiB/s remote: Total 43778 (delta 10885), reused 10692 (delta 10665), pack-reused 32046 (from 1) Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (43778/43778), 13.07 MiB | 26.14 MiB/s Receiving objects: 100% (43778/43778), 20.26 MiB | 28.57 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/29153) Resolving deltas: 1% (292/29153) Resolving deltas: 2% (589/29153) Resolving deltas: 3% (886/29153) Resolving deltas: 4% (1168/29153) Resolving deltas: 5% (1462/29153) Resolving deltas: 6% (1758/29153) Resolving deltas: 7% (2054/29153) Resolving deltas: 8% (2343/29153) Resolving deltas: 9% (2771/29153) Resolving deltas: 10% (2943/29153) Resolving deltas: 11% (3235/29153) Resolving deltas: 12% (3579/29153) Resolving deltas: 13% (3790/29153) Resolving deltas: 14% (4107/29153) Resolving deltas: 15% (4418/29153) Resolving deltas: 16% (4682/29153) Resolving deltas: 17% (4971/29153) Resolving deltas: 18% (5266/29153) Resolving deltas: 19% (5559/29153) Resolving deltas: 20% (5831/29153) Resolving deltas: 21% (6137/29153) Resolving deltas: 22% (6419/29153) Resolving deltas: 23% (6706/29153) Resolving deltas: 24% (7030/29153) Resolving deltas: 25% (7291/29153) Resolving deltas: 26% (7651/29153) Resolving deltas: 27% (7882/29153) Resolving deltas: 28% (8179/29153) Resolving deltas: 29% (8476/29153) Resolving deltas: 30% (8746/29153) Resolving deltas: 31% (9072/29153) Resolving deltas: 32% (9337/29153) Resolving deltas: 33% (9785/29153) Resolving deltas: 34% (9921/29153) Resolving deltas: 35% (10222/29153) Resolving deltas: 36% (10498/29153) Resolving deltas: 37% (10789/29153) Resolving deltas: 38% (11083/29153) Resolving deltas: 39% (11397/29153) Resolving deltas: 41% (11961/29153) Resolving deltas: 42% (12271/29153) Resolving deltas: 43% (12537/29153) Resolving deltas: 44% (12828/29153) Resolving deltas: 45% (13123/29153) Resolving deltas: 46% (13424/29153) Resolving deltas: 47% (13868/29153) Resolving deltas: 48% (14004/29153) Resolving deltas: 49% (14290/29153) Resolving deltas: 50% (14577/29153) Resolving deltas: 51% (14881/29153) Resolving deltas: 52% (15174/29153) Resolving deltas: 53% (15459/29153) Resolving deltas: 54% (15749/29153) Resolving deltas: 55% (16051/29153) Resolving deltas: 56% (16328/29153) Resolving deltas: 57% (16647/29153) Resolving deltas: 58% (16913/29153) Resolving deltas: 59% (17204/29153) Resolving deltas: 60% (17504/29153) Resolving deltas: 61% (17827/29153) Resolving deltas: 62% (18081/29153) Resolving deltas: 63% (18371/29153) Resolving deltas: 64% (18692/29153) Resolving deltas: 65% (18982/29153) Resolving deltas: 66% (19292/29153) Resolving deltas: 67% (19562/29153) Resolving deltas: 68% (19989/29153) Resolving deltas: 70% (20428/29153) Resolving deltas: 71% (20838/29153) Resolving deltas: 72% (21049/29153) Resolving deltas: 73% (21482/29153) Resolving deltas: 74% (21589/29153) Resolving deltas: 75% (21911/29153) Resolving deltas: 76% (22278/29153) Resolving deltas: 77% (22449/29153) Resolving deltas: 78% (22740/29153) Resolving deltas: 79% (23064/29153) Resolving deltas: 80% (23323/29153) Resolving deltas: 81% (23614/29153) Resolving deltas: 82% (23922/29153) Resolving deltas: 83% (24202/29153) Resolving deltas: 84% (24516/29153) Resolving deltas: 85% (24898/29153) Resolving deltas: 86% (25112/29153) Resolving deltas: 87% (25369/29153) Resolving deltas: 88% (25666/29153) Resolving deltas: 89% (25949/29153) Resolving deltas: 90% (26348/29153) Resolving deltas: 91% (26633/29153) Resolving deltas: 92% (26836/29153) Resolving deltas: 93% (27129/29153) Resolving deltas: 94% (27504/29153) Resolving deltas: 95% (27697/29153) Resolving deltas: 96% (27991/29153) Resolving deltas: 97% (28322/29153) Resolving deltas: 98% (28579/29153) Resolving deltas: 99% (28862/29153) Resolving deltas: 100% (29153/29153) Resolving deltas: 100% (29153/29153), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.14-11-ged38aea9 -X main.version=1.1.14+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=59ffbf4.m -X github.com/containerd/containerd/v2/version.Revision=59ffbf4ce32c71c73627bf0cb3b94587677a0020.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=59ffbf4.m -X github.com/containerd/containerd/v2/version.Revision=59ffbf4ce32c71c73627bf0cb3b94587677a0020.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/containerd/containerd/v2/cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/ld: /usr/bin/ld: DWARF error: invalid or unhandled FORM value: 0x25 Step #3 - "compile-libfuzzer-coverage-x86_64": /tmp/go-link-3618783142/000020.o: in function `New': Step #3 - "compile-libfuzzer-coverage-x86_64": pkcs11.cgo2.c:(.text+0x22): warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=59ffbf4.m -X github.com/containerd/containerd/v2/version.Revision=59ffbf4ce32c71c73627bf0cb3b94587677a0020.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": CGO_ENABLED=0 go build -o bin/containerd-shim-runc-v2 -ldflags '-X github.com/containerd/containerd/v2/version.Version=59ffbf4.m -X github.com/containerd/containerd/v2/version.Revision=59ffbf4ce32c71c73627bf0cb3b94587677a0020.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -extldflags "-static" -s -w' -tags "urfave_cli_no_docs osusergo netgo static_build no_grpc" ./cmd/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*data' compile_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegNoTearDownWithDownload(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerNoTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerWithTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: f2fcf2e227f4: Already exists Step #4: da477cd879f9: Already exists Step #4: e3147f0f5aa7: Pulling fs layer Step #4: 212caf9889a8: Pulling fs layer Step #4: ff46d2796520: Pulling fs layer Step #4: 0afcd4102beb: Pulling fs layer Step #4: e3357d2e3b70: Pulling fs layer Step #4: 332b09a081a4: Pulling fs layer Step #4: e69b7904ef4a: Pulling fs layer Step #4: 3dab0c1c9afc: Pulling fs layer Step #4: 54aabd6ba6d7: Pulling fs layer Step #4: 95db293157e7: Pulling fs layer Step #4: 8bbb32fbe931: Pulling fs layer Step #4: b77d5d12a661: Pulling fs layer Step #4: 04590942d0eb: Pulling fs layer Step #4: 77d409db27d3: Pulling fs layer Step #4: 376a44370e41: Pulling fs layer Step #4: 99dfb22c02e0: Pulling fs layer Step #4: 53ffe873a673: Pulling fs layer Step #4: e3357d2e3b70: Waiting Step #4: 54aabd6ba6d7: Waiting Step #4: 95db293157e7: Waiting Step #4: 332b09a081a4: Waiting Step #4: 8bbb32fbe931: Waiting Step #4: e69b7904ef4a: Waiting Step #4: b77d5d12a661: Waiting Step #4: 3dab0c1c9afc: Waiting Step #4: 04590942d0eb: Waiting Step #4: 77d409db27d3: Waiting Step #4: 376a44370e41: Waiting Step #4: 99dfb22c02e0: Waiting Step #4: 0afcd4102beb: Waiting Step #4: ff46d2796520: Download complete Step #4: e3147f0f5aa7: Verifying Checksum Step #4: e3147f0f5aa7: Download complete Step #4: 212caf9889a8: Verifying Checksum Step #4: 212caf9889a8: Download complete Step #4: e3147f0f5aa7: Pull complete Step #4: e3357d2e3b70: Verifying Checksum Step #4: e3357d2e3b70: Download complete Step #4: 332b09a081a4: Verifying Checksum Step #4: 332b09a081a4: Download complete Step #4: e69b7904ef4a: Download complete Step #4: 54aabd6ba6d7: Download complete Step #4: 212caf9889a8: Pull complete Step #4: ff46d2796520: Pull complete Step #4: 3dab0c1c9afc: Verifying Checksum Step #4: 3dab0c1c9afc: Download complete Step #4: 0afcd4102beb: Verifying Checksum Step #4: 0afcd4102beb: Download complete Step #4: 8bbb32fbe931: Verifying Checksum Step #4: 8bbb32fbe931: Download complete Step #4: b77d5d12a661: Download complete Step #4: 04590942d0eb: Verifying Checksum Step #4: 04590942d0eb: Download complete Step #4: 376a44370e41: Verifying Checksum Step #4: 376a44370e41: Download complete Step #4: 77d409db27d3: Verifying Checksum Step #4: 77d409db27d3: Download complete Step #4: 99dfb22c02e0: Verifying Checksum Step #4: 99dfb22c02e0: Download complete Step #4: 95db293157e7: Verifying Checksum Step #4: 95db293157e7: Download complete Step #4: 53ffe873a673: Verifying Checksum Step #4: 53ffe873a673: Download complete Step #4: 0afcd4102beb: Pull complete Step #4: e3357d2e3b70: Pull complete Step #4: 332b09a081a4: Pull complete Step #4: e69b7904ef4a: Pull complete Step #4: 3dab0c1c9afc: Pull complete Step #4: 54aabd6ba6d7: Pull complete Step #4: 95db293157e7: Pull complete Step #4: 8bbb32fbe931: Pull complete Step #4: b77d5d12a661: Pull complete Step #4: 04590942d0eb: Pull complete Step #4: 77d409db27d3: Pull complete Step #4: 376a44370e41: Pull complete Step #4: 99dfb22c02e0: Pull complete Step #4: 53ffe873a673: Pull complete Step #4: Digest: sha256:1b2ada45868789b0d49b3664b999acc45639a4f23ecf4f2a3056ec8833910743 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_FuzzCRIServer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzCRIServer.zip or Step #5: /corpus/fuzz_FuzzCRIServer.zip.zip, and cannot find /corpus/fuzz_FuzzCRIServer.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzCRIServer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_FuzzContainerdImport.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzContainerdImport.zip or Step #5: /corpus/fuzz_FuzzContainerdImport.zip.zip, and cannot find /corpus/fuzz_FuzzContainerdImport.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzContainerdImport. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/fuzz_FuzzIntegNoTearDownWithDownload.zip]: zipfile is empty Step #5: Failed to unpack the corpus for fuzz_FuzzIntegNoTearDownWithDownload. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: Running go target fuzz_FuzzCSWalk Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzExchange Step #5: Running go target fuzz_FuzzContentStore Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzArchiveExport Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: cp: cannot stat '/corpus/fuzz_FuzzIntegNoTearDownWithDownload/': No such file or directory Step #5: Running go target fuzz_FuzzConvertManifest Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: Running go target fuzz_FuzzParseAuth Step #5: 2024/10/05 06:30:41 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: Running go target fuzz_FuzzFiltersParse Step #5: Running go target fuzz_FuzzFetcher Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzLeaseManager Step #5: Running go target fuzz_FuzzApply Step #5: Running go target fuzz_FuzzDiffCompare Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffApply Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2024/10/05 06:30:50 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImportIndex Step #5: Running go target fuzz_FuzzImageStore Step #5: Running go target fuzz_FuzzCRIServer Step #5: cp: cannot stat '/corpus/fuzz_FuzzCRIServer/': No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzDiffApply: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/0095e95bca1210630a5c8738245aefc47f0ac601 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.2% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzImagesCheck Step #5: Running go target fuzz_FuzzContainerStore Step #5: Running go target fuzz_FuzzDecompressStream Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzUUIDParse Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzExchange: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/001b93f502d831610fdca9f2caa94bec748dc72a non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.2% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzContainerdImport Step #5: cp: cannot stat '/corpus/fuzz_FuzzContainerdImport/': No such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2024/10/05 06:31:10 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: Error occured while running fuzz_FuzzDiffCompare: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffCompare/002677048b1cd05b884cdbdaf5135a442a1c4720 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.3% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzLeaseManager: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/001b9f643bbea7fe4e10433fedf8c06ce7e43494 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.8% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzUUIDParse: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzUUIDParse/01275d1c001d4f9417ca3190279212d4887c5b3e non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.3% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImagesCheck: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/0053576e8ebfb61c5b836a8428d62fa68f4c04ff non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.5% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContentStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/008ae606ef9f2c4b546f24e17842960ad3a233a1 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 7.6% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImageStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/001284856f3343339dfee8a0d4f63b85581cd304 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 7.0% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContainerStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002b97bab843f6c3358bc99ec21d31fb8f935d69 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 7.5% of statements in github.com/containerd/containerd/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2024/10/05 06:33:52 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzCRIServer.perf.cpu.prof": parsing profile: empty input file Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done / [1/4 files][ 2.5 MiB/ 8.5 MiB] 29% Done / [2/4 files][ 8.5 MiB/ 8.5 MiB] 99% Done / [3/4 files][ 8.5 MiB/ 8.5 MiB] 99% Done / [4/4 files][ 8.5 MiB/ 8.5 MiB] 100% Done Step #7: Operation completed over 4 objects/8.5 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzUUIDParse.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [0/30 files][ 2.7 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [0/30 files][ 2.7 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: / [0/30 files][ 2.7 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [0/30 files][208.2 KiB/ 3.3 MiB] 6% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: / [0/30 files][208.2 KiB/ 3.3 MiB] 6% Done / [1/30 files][638.1 KiB/ 3.3 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [1/30 files][638.1 KiB/ 3.3 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [1/30 files][638.1 KiB/ 3.3 MiB] 18% Done / [2/30 files][638.1 KiB/ 3.3 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: / [2/30 files][638.1 KiB/ 3.3 MiB] 18% Done / [3/30 files][842.8 KiB/ 3.3 MiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [3/30 files][842.8 KiB/ 3.3 MiB] 24% Done / [4/30 files][842.8 KiB/ 3.3 MiB] 24% Done / [5/30 files][842.8 KiB/ 3.3 MiB] 24% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [5/30 files][842.8 KiB/ 3.3 MiB] 24% Done / [6/30 files][ 1.4 MiB/ 3.3 MiB] 43% Done / [7/30 files][ 1.4 MiB/ 3.3 MiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [7/30 files][ 1.4 MiB/ 3.3 MiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: / [7/30 files][ 1.4 MiB/ 3.3 MiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: / [7/30 files][ 1.4 MiB/ 3.3 MiB] 43% Done / [8/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: / [8/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done / [9/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.5 MiB/ 3.3 MiB] 44% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.9 MiB/ 3.3 MiB] 56% Done / [10/30 files][ 1.9 MiB/ 3.3 MiB] 56% Done / [11/30 files][ 1.9 MiB/ 3.3 MiB] 56% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done / [11/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done / [12/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done / [13/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done / [14/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done / [15/30 files][ 2.1 MiB/ 3.3 MiB] 62% Done - - [16/30 files][ 2.9 MiB/ 3.3 MiB] 86% Done - [17/30 files][ 2.9 MiB/ 3.3 MiB] 86% Done - [18/30 files][ 2.9 MiB/ 3.3 MiB] 86% Done - [19/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [20/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [21/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [22/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [23/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [24/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [25/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [26/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [27/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [28/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [29/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [30/30 files][ 3.3 MiB/ 3.3 MiB] 100% Done Step #9: Operation completed over 30 objects/3.3 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzUUIDParse.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 269.0 B/ 5.4 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 269.0 B/ 5.4 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 544.0 B/ 5.4 KiB] 9% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 544.0 B/ 5.4 KiB] 9% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 544.0 B/ 5.4 KiB] 9% Done / [1/29 files][ 972.0 B/ 5.4 KiB] 17% Done / [2/29 files][ 972.0 B/ 5.4 KiB] 17% Done / [3/29 files][ 1.2 KiB/ 5.4 KiB] 22% Done / [4/29 files][ 1.2 KiB/ 5.4 KiB] 22% Done / [5/29 files][ 1.2 KiB/ 5.4 KiB] 22% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 1.2 KiB/ 5.4 KiB] 22% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 1.7 KiB/ 5.4 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 1.7 KiB/ 5.4 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 1.7 KiB/ 5.4 KiB] 31% Done / [6/29 files][ 1.7 KiB/ 5.4 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.7 KiB/ 5.4 KiB] 31% Done / [7/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done / [8/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done / [9/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done / [10/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done / [11/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.0 KiB/ 5.4 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.0 KiB/ 5.4 KiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.1 KiB/ 5.4 KiB] 39% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [11/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done / [12/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done / [13/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done - - [14/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done - [15/29 files][ 2.3 KiB/ 5.4 KiB] 42% Done - [16/29 files][ 3.8 KiB/ 5.4 KiB] 70% Done - [17/29 files][ 5.2 KiB/ 5.4 KiB] 96% Done - [18/29 files][ 5.2 KiB/ 5.4 KiB] 96% Done - [19/29 files][ 5.2 KiB/ 5.4 KiB] 96% Done - [20/29 files][ 5.2 KiB/ 5.4 KiB] 97% Done - [21/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [22/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [23/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [24/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [25/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [26/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [27/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [28/29 files][ 5.4 KiB/ 5.4 KiB] 99% Done - [29/29 files][ 5.4 KiB/ 5.4 KiB] 100% Done Step #11: Operation completed over 29 objects/5.4 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1796 --:--:-- --:--:-- --:--:-- 1806 Finished Step #13 PUSH DONE