starting build "3f96230c-bac9-41bf-899e-751302e7c23e" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: c9e4fdf1b31c: Pulling fs layer Step #1: b7f2dc3f71b0: Pulling fs layer Step #1: 3381df754388: Pulling fs layer Step #1: cba3bb3c9b9d: Pulling fs layer Step #1: 185094d44e9e: Pulling fs layer Step #1: ed18f578cd61: Pulling fs layer Step #1: 0ba71dfdab95: Pulling fs layer Step #1: 5b69eeb9fa24: Pulling fs layer Step #1: 874eda30f197: Pulling fs layer Step #1: ecb66c1644d8: Pulling fs layer Step #1: cde3fd6d458c: Pulling fs layer Step #1: e892bb6037f0: Pulling fs layer Step #1: 3687974c4ea2: Pulling fs layer Step #1: 0f3f3a32cc3c: Pulling fs layer Step #1: 30a91c100c5f: Pulling fs layer Step #1: 1b9b6affccff: Pulling fs layer Step #1: dc6a6e4a7b0f: Pulling fs layer Step #1: e585942c7266: Pulling fs layer Step #1: 756c031d86bd: Pulling fs layer Step #1: 181b7bd71ea9: Pulling fs layer Step #1: 8b16357d3d69: Pulling fs layer Step #1: e7dd0733a60b: Pulling fs layer Step #1: efe7bdeb7eae: Pulling fs layer Step #1: 7f7615f2d9fb: Pulling fs layer Step #1: aaef6a297807: Pulling fs layer Step #1: 2c46863dc417: Pulling fs layer Step #1: 0ba71dfdab95: Waiting Step #1: 510f88cf0f67: Pulling fs layer Step #1: 5b69eeb9fa24: Waiting Step #1: 07584cf0ec19: Pulling fs layer Step #1: ec7508ed40d1: Pulling fs layer Step #1: 874eda30f197: Waiting Step #1: 821f93dc1b35: Pulling fs layer Step #1: 0f3f3a32cc3c: Waiting Step #1: ec45d7ceb5aa: Pulling fs layer Step #1: ecb66c1644d8: Waiting Step #1: 69532b38715c: Pulling fs layer Step #1: 9fcb216f4af0: Pulling fs layer Step #1: 9238eab64b43: Pulling fs layer Step #1: 3ae6c91d2a0f: Pulling fs layer Step #1: 7d962e5d5fb6: Pulling fs layer Step #1: e892bb6037f0: Waiting Step #1: 3687974c4ea2: Waiting Step #1: 756c031d86bd: Waiting Step #1: 8b16357d3d69: Waiting Step #1: cde3fd6d458c: Waiting Step #1: 181b7bd71ea9: Waiting Step #1: 9fcb216f4af0: Waiting Step #1: ed18f578cd61: Waiting Step #1: 30a91c100c5f: Waiting Step #1: dc6a6e4a7b0f: Waiting Step #1: 3381df754388: Waiting Step #1: 7f7615f2d9fb: Waiting Step #1: 3ae6c91d2a0f: Waiting Step #1: cba3bb3c9b9d: Waiting Step #1: 821f93dc1b35: Waiting Step #1: 2c46863dc417: Waiting Step #1: 07584cf0ec19: Waiting Step #1: 7d962e5d5fb6: Waiting Step #1: e585942c7266: Waiting Step #1: aaef6a297807: Waiting Step #1: 1b9b6affccff: Waiting Step #1: 185094d44e9e: Waiting Step #1: 9238eab64b43: Waiting Step #1: ec7508ed40d1: Waiting Step #1: e7dd0733a60b: Waiting Step #1: b7f2dc3f71b0: Verifying Checksum Step #1: b7f2dc3f71b0: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: cba3bb3c9b9d: Verifying Checksum Step #1: cba3bb3c9b9d: Download complete Step #1: 3381df754388: Verifying Checksum Step #1: 3381df754388: Download complete Step #1: 185094d44e9e: Download complete Step #1: 0ba71dfdab95: Verifying Checksum Step #1: 0ba71dfdab95: Download complete Step #1: c9e4fdf1b31c: Verifying Checksum Step #1: c9e4fdf1b31c: Download complete Step #1: 5b69eeb9fa24: Download complete Step #1: b549f31133a9: Pull complete Step #1: ecb66c1644d8: Verifying Checksum Step #1: ecb66c1644d8: Download complete Step #1: cde3fd6d458c: Verifying Checksum Step #1: cde3fd6d458c: Download complete Step #1: e892bb6037f0: Verifying Checksum Step #1: e892bb6037f0: Download complete Step #1: 3687974c4ea2: Verifying Checksum Step #1: 3687974c4ea2: Download complete Step #1: 0f3f3a32cc3c: Verifying Checksum Step #1: 0f3f3a32cc3c: Download complete Step #1: 30a91c100c5f: Verifying Checksum Step #1: 30a91c100c5f: Download complete Step #1: 1b9b6affccff: Verifying Checksum Step #1: 1b9b6affccff: Download complete Step #1: 874eda30f197: Verifying Checksum Step #1: 874eda30f197: Download complete Step #1: dc6a6e4a7b0f: Verifying Checksum Step #1: dc6a6e4a7b0f: Download complete Step #1: e585942c7266: Download complete Step #1: 756c031d86bd: Verifying Checksum Step #1: 756c031d86bd: Download complete Step #1: 181b7bd71ea9: Verifying Checksum Step #1: 181b7bd71ea9: Download complete Step #1: 8b16357d3d69: Verifying Checksum Step #1: 8b16357d3d69: Download complete Step #1: e7dd0733a60b: Verifying Checksum Step #1: e7dd0733a60b: Download complete Step #1: efe7bdeb7eae: Download complete Step #1: 7f7615f2d9fb: Verifying Checksum Step #1: 7f7615f2d9fb: Download complete Step #1: aaef6a297807: Verifying Checksum Step #1: aaef6a297807: Download complete Step #1: ed18f578cd61: Verifying Checksum Step #1: ed18f578cd61: Download complete Step #1: 510f88cf0f67: Verifying Checksum Step #1: 510f88cf0f67: Download complete Step #1: 2c46863dc417: Verifying Checksum Step #1: 2c46863dc417: Download complete Step #1: 07584cf0ec19: Verifying Checksum Step #1: 07584cf0ec19: Download complete Step #1: 821f93dc1b35: Verifying Checksum Step #1: 821f93dc1b35: Download complete Step #1: 69532b38715c: Verifying Checksum Step #1: 69532b38715c: Download complete Step #1: 9fcb216f4af0: Verifying Checksum Step #1: 9fcb216f4af0: Download complete Step #1: ec7508ed40d1: Verifying Checksum Step #1: ec7508ed40d1: Download complete Step #1: 9238eab64b43: Verifying Checksum Step #1: 9238eab64b43: Download complete Step #1: 7d962e5d5fb6: Verifying Checksum Step #1: 7d962e5d5fb6: Download complete Step #1: c9e4fdf1b31c: Pull complete Step #1: b7f2dc3f71b0: Pull complete Step #1: 3381df754388: Pull complete Step #1: 3ae6c91d2a0f: Verifying Checksum Step #1: 3ae6c91d2a0f: Download complete Step #1: cba3bb3c9b9d: Pull complete Step #1: 185094d44e9e: Pull complete Step #1: ed18f578cd61: Pull complete Step #1: 0ba71dfdab95: Pull complete Step #1: 5b69eeb9fa24: Pull complete Step #1: 874eda30f197: Pull complete Step #1: ecb66c1644d8: Pull complete Step #1: cde3fd6d458c: Pull complete Step #1: e892bb6037f0: Pull complete Step #1: 3687974c4ea2: Pull complete Step #1: 0f3f3a32cc3c: Pull complete Step #1: 30a91c100c5f: Pull complete Step #1: 1b9b6affccff: Pull complete Step #1: dc6a6e4a7b0f: Pull complete Step #1: e585942c7266: Pull complete Step #1: 756c031d86bd: Pull complete Step #1: 181b7bd71ea9: Pull complete Step #1: 8b16357d3d69: Pull complete Step #1: e7dd0733a60b: Pull complete Step #1: efe7bdeb7eae: Pull complete Step #1: 7f7615f2d9fb: Pull complete Step #1: aaef6a297807: Pull complete Step #1: 2c46863dc417: Pull complete Step #1: 510f88cf0f67: Pull complete Step #1: 07584cf0ec19: Pull complete Step #1: ec7508ed40d1: Pull complete Step #1: 821f93dc1b35: Pull complete Step #1: ec45d7ceb5aa: Pull complete Step #1: 69532b38715c: Pull complete Step #1: 9fcb216f4af0: Pull complete Step #1: 9238eab64b43: Pull complete Step #1: 3ae6c91d2a0f: Pull complete Step #1: 7d962e5d5fb6: Pull complete Step #1: Digest: sha256:3b83bd080c35874a6aacb47eb22a7a8c6eb4178a5bb1ae9fd4c1a59c0bd50351 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> e107b70c95e8 Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/opencontainers/runc Step #1: ---> Running in 8459a99c2fd0 Step #1: Cloning into 'runc'... Step #1: Removing intermediate container 8459a99c2fd0 Step #1: ---> ed77e1859010 Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in 2c2651621dc6 Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container 2c2651621dc6 Step #1: ---> 9ac3b1b711a5 Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> c2ed7cc072de Step #1: Step 5/5 : WORKDIR $SRC/runc Step #1: ---> Running in 7dfc1378f003 Step #1: Removing intermediate container 7dfc1378f003 Step #1: ---> c62c6bdb2ea0 Step #1: Successfully built c62c6bdb2ea0 Step #1: Successfully tagged gcr.io/oss-fuzz/runc:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/runc Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filesOJCfM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=405330cce356062c1e7748083fc0a26c8b20c7fd Step #2 - "srcmap": + jq_inplace /tmp/filesOJCfM '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "405330cce356062c1e7748083fc0a26c8b20c7fd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileBcuF3a Step #2 - "srcmap": + cat /tmp/filesOJCfM Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "405330cce356062c1e7748083fc0a26c8b20c7fd" }' Step #2 - "srcmap": + mv /tmp/fileBcuF3a /tmp/filesOJCfM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/runc/.git Step #2 - "srcmap": + GIT_DIR=/src/runc Step #2 - "srcmap": + cd /src/runc Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/opencontainers/runc Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=eb596b8d3b8b5731f181e4c971c49e967dce8e88 Step #2 - "srcmap": + jq_inplace /tmp/filesOJCfM '."/src/runc" = { type: "git", url: "https://github.com/opencontainers/runc", rev: "eb596b8d3b8b5731f181e4c971c49e967dce8e88" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileHCZsvK Step #2 - "srcmap": + cat /tmp/filesOJCfM Step #2 - "srcmap": + jq '."/src/runc" = { type: "git", url: "https://github.com/opencontainers/runc", rev: "eb596b8d3b8b5731f181e4c971c49e967dce8e88" }' Step #2 - "srcmap": + mv /tmp/fileHCZsvK /tmp/filesOJCfM Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filesOJCfM Step #2 - "srcmap": + rm /tmp/filesOJCfM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "405330cce356062c1e7748083fc0a26c8b20c7fd" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/runc": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/opencontainers/runc", Step #2 - "srcmap": "rev": "eb596b8d3b8b5731f181e4c971c49e967dce8e88" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/runc/tests/fuzzing/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/userns: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.4 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/seccomp/libseccomp-golang v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mrunalp/fileutils v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230224173230-c95f2b4c22f2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/userns [github.com/opencontainers/runc/libcontainer/userns.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuidmap_test.go:63:3: undefined: FuzzUIDMap Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/user: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/user Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/user Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/user [github.com/opencontainers/runc/libcontainer/user.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuser_test.go:63:3: undefined: FuzzUser Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/configs: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/configs Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/configs Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/runc/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + go clean --modcache Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.4 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/seccomp/libseccomp-golang v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mrunalp/fileutils v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230224173230-c95f2b4c22f2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r /src/runc/vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/AdaLogics/go-fuzz-headers Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": + export RUNC_PATH=github.com/opencontainers/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + RUNC_PATH=github.com/opencontainers/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + export RUNC_FUZZERS=/src/cncf-fuzzing/projects/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + RUNC_FUZZERS=/src/cncf-fuzzing/projects/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/opencontainers/runc/libcontainer/userns FuzzUIDMap fuzz_uid_map Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/userns: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/userns [github.com/opencontainers/runc/libcontainer/userns.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuidmap_test.go:63:3: undefined: FuzzUIDMap Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image runc Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 runc Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1