starting build "4f323003-21cb-4c9b-961b-a2e0e46c6c0b" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 9f80bca35359: Pulling fs layer Step #1: c2e9ab7e6d55: Pulling fs layer Step #1: a2c1799b005c: Pulling fs layer Step #1: 647124c852bc: Pulling fs layer Step #1: 4c0db9535385: Pulling fs layer Step #1: 7d9d6400b844: Pulling fs layer Step #1: b95ba533437d: Pulling fs layer Step #1: 98ef18780bd4: Pulling fs layer Step #1: 0bcc6c903840: Pulling fs layer Step #1: 294ba0b9a924: Pulling fs layer Step #1: 344841c178fd: Pulling fs layer Step #1: 8a24d9f6813c: Pulling fs layer Step #1: 8cfff2f8b62b: Pulling fs layer Step #1: 7b6fc8fef10c: Pulling fs layer Step #1: b56b52e44dc7: Pulling fs layer Step #1: d4dbf4e8824f: Pulling fs layer Step #1: fa95fc65ee8e: Pulling fs layer Step #1: 1da1ba4445a7: Pulling fs layer Step #1: 14cc587b05ae: Pulling fs layer Step #1: 03fa8c0fad9a: Pulling fs layer Step #1: ccfd740776f9: Pulling fs layer Step #1: 04ec2d031af9: Pulling fs layer Step #1: 0fe86fe6d25a: Pulling fs layer Step #1: 7d9d6400b844: Waiting Step #1: 3d5e727cc8f7: Pulling fs layer Step #1: 639389e328da: Pulling fs layer Step #1: b95ba533437d: Waiting Step #1: da2ba7c8e5f6: Pulling fs layer Step #1: 0c2ec5c7c85c: Pulling fs layer Step #1: 98ef18780bd4: Waiting Step #1: 344841c178fd: Waiting Step #1: 189e9da4e490: Pulling fs layer Step #1: 0bcc6c903840: Waiting Step #1: 6ec4707e85be: Pulling fs layer Step #1: 294ba0b9a924: Waiting Step #1: 82d8b86a5370: Pulling fs layer Step #1: be9c3baf7740: Pulling fs layer Step #1: 8a24d9f6813c: Waiting Step #1: 52700f3e6f6e: Pulling fs layer Step #1: ccfd740776f9: Waiting Step #1: 8cfff2f8b62b: Waiting Step #1: fa95fc65ee8e: Waiting Step #1: 04ec2d031af9: Waiting Step #1: 0fe86fe6d25a: Waiting Step #1: 1da1ba4445a7: Waiting Step #1: da2ba7c8e5f6: Waiting Step #1: d4dbf4e8824f: Waiting Step #1: 3d5e727cc8f7: Waiting Step #1: 14cc587b05ae: Waiting Step #1: 0c2ec5c7c85c: Waiting Step #1: 639389e328da: Waiting Step #1: 03fa8c0fad9a: Waiting Step #1: 189e9da4e490: Waiting Step #1: be9c3baf7740: Waiting Step #1: b56b52e44dc7: Waiting Step #1: 6ec4707e85be: Waiting Step #1: 82d8b86a5370: Waiting Step #1: a2c1799b005c: Waiting Step #1: 4c0db9535385: Waiting Step #1: 647124c852bc: Waiting Step #1: c2e9ab7e6d55: Verifying Checksum Step #1: c2e9ab7e6d55: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: a2c1799b005c: Verifying Checksum Step #1: a2c1799b005c: Download complete Step #1: 647124c852bc: Verifying Checksum Step #1: 647124c852bc: Download complete Step #1: b95ba533437d: Verifying Checksum Step #1: b95ba533437d: Download complete Step #1: 98ef18780bd4: Verifying Checksum Step #1: 98ef18780bd4: Download complete Step #1: 9f80bca35359: Verifying Checksum Step #1: 9f80bca35359: Download complete Step #1: 294ba0b9a924: Verifying Checksum Step #1: 294ba0b9a924: Download complete Step #1: 344841c178fd: Verifying Checksum Step #1: 344841c178fd: Download complete Step #1: 8a24d9f6813c: Verifying Checksum Step #1: b549f31133a9: Pull complete Step #1: 8a24d9f6813c: Download complete Step #1: 0bcc6c903840: Verifying Checksum Step #1: 0bcc6c903840: Download complete Step #1: 7b6fc8fef10c: Verifying Checksum Step #1: 7b6fc8fef10c: Download complete Step #1: b56b52e44dc7: Verifying Checksum Step #1: b56b52e44dc7: Download complete Step #1: d4dbf4e8824f: Verifying Checksum Step #1: d4dbf4e8824f: Download complete Step #1: 8cfff2f8b62b: Verifying Checksum Step #1: 8cfff2f8b62b: Download complete Step #1: fa95fc65ee8e: Verifying Checksum Step #1: fa95fc65ee8e: Download complete Step #1: 1da1ba4445a7: Download complete Step #1: 14cc587b05ae: Verifying Checksum Step #1: 14cc587b05ae: Download complete Step #1: 03fa8c0fad9a: Download complete Step #1: 04ec2d031af9: Download complete Step #1: 0fe86fe6d25a: Verifying Checksum Step #1: 0fe86fe6d25a: Download complete Step #1: ccfd740776f9: Verifying Checksum Step #1: ccfd740776f9: Download complete Step #1: 639389e328da: Verifying Checksum Step #1: 639389e328da: Download complete Step #1: 3d5e727cc8f7: Verifying Checksum Step #1: 3d5e727cc8f7: Download complete Step #1: 0c2ec5c7c85c: Verifying Checksum Step #1: 0c2ec5c7c85c: Download complete Step #1: 189e9da4e490: Download complete Step #1: da2ba7c8e5f6: Verifying Checksum Step #1: da2ba7c8e5f6: Download complete Step #1: 6ec4707e85be: Verifying Checksum Step #1: 7d9d6400b844: Verifying Checksum Step #1: 7d9d6400b844: Download complete Step #1: 52700f3e6f6e: Download complete Step #1: 82d8b86a5370: Download complete Step #1: 9f80bca35359: Pull complete Step #1: c2e9ab7e6d55: Pull complete Step #1: be9c3baf7740: Verifying Checksum Step #1: be9c3baf7740: Download complete Step #1: a2c1799b005c: Pull complete Step #1: 647124c852bc: Pull complete Step #1: 4c0db9535385: Pull complete Step #1: 7d9d6400b844: Pull complete Step #1: b95ba533437d: Pull complete Step #1: 98ef18780bd4: Pull complete Step #1: 0bcc6c903840: Pull complete Step #1: 294ba0b9a924: Pull complete Step #1: 344841c178fd: Pull complete Step #1: 8a24d9f6813c: Pull complete Step #1: 8cfff2f8b62b: Pull complete Step #1: 7b6fc8fef10c: Pull complete Step #1: b56b52e44dc7: Pull complete Step #1: d4dbf4e8824f: Pull complete Step #1: fa95fc65ee8e: Pull complete Step #1: 1da1ba4445a7: Pull complete Step #1: 14cc587b05ae: Pull complete Step #1: 03fa8c0fad9a: Pull complete Step #1: ccfd740776f9: Pull complete Step #1: 04ec2d031af9: Pull complete Step #1: 0fe86fe6d25a: Pull complete Step #1: 3d5e727cc8f7: Pull complete Step #1: 639389e328da: Pull complete Step #1: da2ba7c8e5f6: Pull complete Step #1: 0c2ec5c7c85c: Pull complete Step #1: 189e9da4e490: Pull complete Step #1: 6ec4707e85be: Pull complete Step #1: 82d8b86a5370: Pull complete Step #1: be9c3baf7740: Pull complete Step #1: 52700f3e6f6e: Pull complete Step #1: Digest: sha256:85f319fbf5616a569784e32a9a62c769b0f735932337d5ddcb610cd268ecb2ca Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 53e71bd3df67 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1: ---> Running in 2e81933bb1ea Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Hit:2 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (169 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1: gcc set to manually installed. Step #1: libc6-dev is already the newest version (2.31-0ubuntu9.15). Step #1: wget is already the newest version (1.20.3-1ubuntu2). Step #1: The following additional packages will be installed: Step #1: libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: duperemove seccomp Step #1: The following NEW packages will be installed: Step #1: btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1: liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.2 MB of archives. Step #1: After this operation, 49.1 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.7 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.7 [5944 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.2 MB in 0s (26.7 MB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.7_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.7_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package liblzo2-2:amd64. Step #1: Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1: Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1: Selecting previously unselected package btrfs-progs. Step #1: Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1: Unpacking btrfs-progs (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs0:amd64. Step #1: Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs-dev:amd64. Step #1: Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.7) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up liblzo2-2:amd64 (2.10-2) ... Step #1: Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.7) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up btrfs-progs (5.4.1-2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.15) ... Step #1: Removing intermediate container 2e81933bb1ea Step #1: ---> 405ae9e3dac9 Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1: ---> Running in a25c9dcdce83 Step #1: Cloning into 'containerd'... Step #1: Removing intermediate container a25c9dcdce83 Step #1: ---> cbc60eeb106f Step #1: Step 4/6 : RUN git clone --depth=1 --branch=dev https://github.com/AdamKorcz/instrumentation Step #1: ---> Running in 8fed4d7fab28 Step #1: Cloning into 'instrumentation'... Step #1: Removing intermediate container 8fed4d7fab28 Step #1: ---> b3b28ed8029f Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 22ae8004e5bc Step #1: Step 6/6 : WORKDIR $SRC/containerd Step #1: ---> Running in cd0a195bc825 Step #1: Removing intermediate container cd0a195bc825 Step #1: ---> 623331e172b7 Step #1: Successfully built 623331e172b7 Step #1: Successfully tagged gcr.io/oss-fuzz/containerd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filehoMLbQ Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=39af94663cf87ba5ab72e41ae6f6409fadd3084d Step #2 - "srcmap": + jq_inplace /tmp/filehoMLbQ '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file3tILfb Step #2 - "srcmap": + cat /tmp/filehoMLbQ Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": + mv /tmp/file3tILfb /tmp/filehoMLbQ Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=29a6ab82611bbec7e01cd43182d4fa38a79cc86d Step #2 - "srcmap": + jq_inplace /tmp/filehoMLbQ '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "29a6ab82611bbec7e01cd43182d4fa38a79cc86d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileUiSM4F Step #2 - "srcmap": + cat /tmp/filehoMLbQ Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "29a6ab82611bbec7e01cd43182d4fa38a79cc86d" }' Step #2 - "srcmap": + mv /tmp/fileUiSM4F /tmp/filehoMLbQ Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filehoMLbQ Step #2 - "srcmap": + rm /tmp/filehoMLbQ Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "39af94663cf87ba5ab72e41ae6f6409fadd3084d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "29a6ab82611bbec7e01cd43182d4fa38a79cc86d" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-coverage-x86_64": + go run main.go /src/containerd/images Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Working] 0% [Working] 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 32% Reading package lists... 32% Reading package lists... 37% Reading package lists... 46% Reading package lists... 46% Reading package lists... 46% Reading package lists... 46% Reading package lists... 47% Reading package lists... 47% Reading package lists... 56% Reading package lists... 56% Reading package lists... 59% Reading package lists... 59% Reading package lists... 68% Reading package lists... 68% Reading package lists... 68% Reading package lists... 68% Reading package lists... 72% Reading package lists... 72% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 83% Reading package lists... 83% Reading package lists... 85% Reading package lists... 85% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 95% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 32% Reading package lists... 32% Reading package lists... 36% Reading package lists... 46% Reading package lists... 46% Reading package lists... 46% Reading package lists... 46% Reading package lists... 47% Reading package lists... 47% Reading package lists... 56% Reading package lists... 56% Reading package lists... 59% Reading package lists... 59% Reading package lists... 68% Reading package lists... 68% Reading package lists... 68% Reading package lists... 68% Reading package lists... 72% Reading package lists... 72% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 74% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 75% Reading package lists... 83% Reading package lists... 83% Reading package lists... 85% Reading package lists... 85% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 95% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.20.3-1ubuntu2). Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.22.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.22.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd/api v1.8.0-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.27.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.63.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.34.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.12.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/vsock v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.120.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20240415180920-8c6c420018be Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/minio/sha256-simd v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20230726121419-3b25d923346b Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.51.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubelet v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.26.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/checkpointctl v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v7 v7.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.2.1-beta.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20240312152122-5f08fbb34913 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.17.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.19.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231214170342-aacd6d4b4611 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20230323073829-e72429f035bd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20240227224415-6ceb2ff114de Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto v0.0.0-20240227224415-6ceb2ff114de Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/appengine v1.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer.go:func FuzzLoadDefaultProfile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/apparmor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzImportIndex(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzzer.go:func FuzzContainerdImport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzCSWalk(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzArchiveExport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_fuzzer.go:func FuzzParseAuth(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzzer.go:func FuzzCRIServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffCompare(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzzer.go:func FuzzExchange(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/fuzz_images.go:func FuzzImagesCheck(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzImageStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzLeaseManager(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContainerStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContentStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/uuid_fuzzer.go:func FuzzUUIDParse(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzUUIDParse fuzz_FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_internal.go:func FuzzParseHostsFile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker/config: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz.go:func FuzzConvertManifest(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz.go:func FuzzFetcher(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer.go:func FuzzDecompressStream(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/pkg/archive/compression: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzzer.go:func FuzzContentStoreWriter(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/plugins/content/local: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 42524, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/119) remote: Counting objects: 1% (2/119) remote: Counting objects: 2% (3/119) remote: Counting objects: 3% (4/119) remote: Counting objects: 4% (5/119) remote: Counting objects: 5% (6/119) remote: Counting objects: 6% (8/119) remote: Counting objects: 7% (9/119) remote: Counting objects: 8% (10/119) remote: Counting objects: 9% (11/119) remote: Counting objects: 10% (12/119) remote: Counting objects: 11% (14/119) remote: Counting objects: 12% (15/119) remote: Counting objects: 13% (16/119) remote: Counting objects: 14% (17/119) remote: Counting objects: 15% (18/119) remote: Counting objects: 16% (20/119) remote: Counting objects: 17% (21/119) remote: Counting objects: 18% (22/119) remote: Counting objects: 19% (23/119) remote: Counting objects: 20% (24/119) remote: Counting objects: 21% (25/119) remote: Counting objects: 22% (27/119) remote: Counting objects: 23% (28/119) remote: Counting objects: 24% (29/119) remote: Counting objects: 25% (30/119) remote: Counting objects: 26% (31/119) remote: Counting objects: 27% (33/119) remote: Counting objects: 28% (34/119) remote: Counting objects: 29% (35/119) remote: Counting objects: 30% (36/119) remote: Counting objects: 31% (37/119) remote: Counting objects: 32% (39/119) remote: Counting objects: 33% (40/119) remote: Counting objects: 34% (41/119) remote: Counting objects: 35% (42/119) remote: Counting objects: 36% (43/119) remote: Counting objects: 37% (45/119) remote: Counting objects: 38% (46/119) remote: Counting objects: 39% (47/119) remote: Counting objects: 40% (48/119) remote: Counting objects: 41% (49/119) remote: Counting objects: 42% (50/119) remote: Counting objects: 43% (52/119) remote: Counting objects: 44% (53/119) remote: Counting objects: 45% (54/119) remote: Counting objects: 46% (55/119) remote: Counting objects: 47% (56/119) remote: Counting objects: 48% (58/119) remote: Counting objects: 49% (59/119) remote: Counting objects: 50% (60/119) remote: Counting objects: 51% (61/119) remote: Counting objects: 52% (62/119) remote: Counting objects: 53% (64/119) remote: Counting objects: 54% (65/119) remote: Counting objects: 55% (66/119) remote: Counting objects: 56% (67/119) remote: Counting objects: 57% (68/119) remote: Counting objects: 58% (70/119) remote: Counting objects: 59% (71/119) remote: Counting objects: 60% (72/119) remote: Counting objects: 61% (73/119) remote: Counting objects: 62% (74/119) remote: Counting objects: 63% (75/119) remote: Counting objects: 64% (77/119) remote: Counting objects: 65% (78/119) remote: Counting objects: 66% (79/119) remote: Counting objects: 67% (80/119) remote: Counting objects: 68% (81/119) remote: Counting objects: 69% (83/119) remote: Counting objects: 70% (84/119) remote: Counting objects: 71% (85/119) remote: Counting objects: 72% (86/119) remote: Counting objects: 73% (87/119) remote: Counting objects: 74% (89/119) remote: Counting objects: 75% (90/119) remote: Counting objects: 76% (91/119) remote: Counting objects: 77% (92/119) remote: Counting objects: 78% (93/119) remote: Counting objects: 79% (95/119) remote: Counting objects: 80% (96/119) remote: Counting objects: 81% (97/119) remote: Counting objects: 82% (98/119) remote: Counting objects: 83% (99/119) remote: Counting objects: 84% (100/119) remote: Counting objects: 85% (102/119) remote: Counting objects: 86% (103/119) remote: Counting objects: 87% (104/119) remote: Counting objects: 88% (105/119) remote: Counting objects: 89% (106/119) remote: Counting objects: 90% (108/119) remote: Counting objects: 91% (109/119) remote: Counting objects: 92% (110/119) remote: Counting objects: 93% (111/119) remote: Counting objects: 94% (112/119) remote: Counting objects: 95% (114/119) remote: Counting objects: 96% (115/119) remote: Counting objects: 97% (116/119) remote: Counting objects: 98% (117/119) remote: Counting objects: 99% (118/119) remote: Counting objects: 100% (119/119) remote: Counting objects: 100% (119/119), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 1% (1/83) remote: Compressing objects: 2% (2/83) remote: Compressing objects: 3% (3/83) remote: Compressing objects: 4% (4/83) remote: Compressing objects: 6% (5/83) remote: Compressing objects: 7% (6/83) remote: Compressing objects: 8% (7/83) remote: Compressing objects: 9% (8/83) remote: Compressing objects: 10% (9/83) remote: Compressing objects: 12% (10/83) remote: Compressing objects: 13% (11/83) remote: Compressing objects: 14% (12/83) remote: Compressing objects: 15% (13/83) remote: Compressing objects: 16% (14/83) remote: Compressing objects: 18% (15/83) remote: Compressing objects: 19% (16/83) remote: Compressing objects: 20% (17/83) remote: Compressing objects: 21% (18/83) remote: Compressing objects: 22% (19/83) remote: Compressing objects: 24% (20/83) remote: Compressing objects: 25% (21/83) remote: Compressing objects: 26% (22/83) remote: Compressing objects: 27% (23/83) remote: Compressing objects: 28% (24/83) remote: Compressing objects: 30% (25/83) remote: Compressing objects: 31% (26/83) remote: Compressing objects: 32% (27/83) remote: Compressing objects: 33% (28/83) remote: Compressing objects: 34% (29/83) remote: Compressing objects: 36% (30/83) remote: Compressing objects: 37% (31/83) remote: Compressing objects: 38% (32/83) remote: Compressing objects: 39% (33/83) remote: Compressing objects: 40% (34/83) remote: Compressing objects: 42% (35/83) remote: Compressing objects: 43% (36/83) remote: Compressing objects: 44% (37/83) remote: Compressing objects: 45% (38/83) remote: Compressing objects: 46% (39/83) remote: Compressing objects: 48% (40/83) remote: Compressing objects: 49% (41/83) remote: Compressing objects: 50% (42/83) remote: Compressing objects: 51% (43/83) remote: Compressing objects: 53% (44/83) remote: Compressing objects: 54% (45/83) remote: Compressing objects: 55% (46/83) remote: Compressing objects: 56% (47/83) remote: Compressing objects: 57% (48/83) remote: Compressing objects: 59% (49/83) remote: Compressing objects: 60% (50/83) remote: Compressing objects: 61% (51/83) remote: Compressing objects: 62% (52/83) remote: Compressing objects: 63% (53/83) remote: Compressing objects: 65% (54/83) remote: Compressing objects: 66% (55/83) remote: Compressing objects: 67% (56/83) remote: Compressing objects: 68% (57/83) remote: Compressing objects: 69% (58/83) remote: Compressing objects: 71% (59/83) remote: Compressing objects: 72% (60/83) remote: Compressing objects: 73% (61/83) remote: Compressing objects: 74% (62/83) remote: Compressing objects: 75% (63/83) remote: Compressing objects: 77% (64/83) remote: Compressing objects: 78% (65/83) remote: Compressing objects: 79% (66/83) remote: Compressing objects: 80% (67/83) remote: Compressing objects: 81% (68/83) remote: Compressing objects: 83% (69/83) remote: Compressing objects: 84% (70/83) remote: Compressing objects: 85% (71/83) remote: Compressing objects: 86% (72/83) remote: Compressing objects: 87% (73/83) remote: Compressing objects: 89% (74/83) remote: Compressing objects: 90% (75/83) remote: Compressing objects: 91% (76/83) remote: Compressing objects: 92% (77/83) remote: Compressing objects: 93% (78/83) remote: Compressing objects: 95% (79/83) remote: Compressing objects: 96% (80/83) remote: Compressing objects: 97% (81/83) remote: Compressing objects: 98% (82/83) remote: Compressing objects: 100% (83/83) remote: Compressing objects: 100% (83/83), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/42524) Receiving objects: 1% (426/42524) Receiving objects: 2% (851/42524) Receiving objects: 3% (1276/42524) Receiving objects: 4% (1701/42524) Receiving objects: 5% (2127/42524) Receiving objects: 6% (2552/42524) Receiving objects: 7% (2977/42524) Receiving objects: 8% (3402/42524) Receiving objects: 9% (3828/42524) Receiving objects: 10% (4253/42524) Receiving objects: 11% (4678/42524) Receiving objects: 12% (5103/42524) Receiving objects: 13% (5529/42524) Receiving objects: 14% (5954/42524) Receiving objects: 15% (6379/42524) Receiving objects: 16% (6804/42524) Receiving objects: 17% (7230/42524) Receiving objects: 18% (7655/42524) Receiving objects: 19% (8080/42524) Receiving objects: 20% (8505/42524) Receiving objects: 21% (8931/42524) Receiving objects: 22% (9356/42524) Receiving objects: 23% (9781/42524) Receiving objects: 24% (10206/42524) Receiving objects: 25% (10631/42524) Receiving objects: 26% (11057/42524) Receiving objects: 27% (11482/42524) Receiving objects: 28% (11907/42524) Receiving objects: 29% (12332/42524) Receiving objects: 30% (12758/42524) Receiving objects: 31% (13183/42524) Receiving objects: 32% (13608/42524) Receiving objects: 33% (14033/42524) Receiving objects: 34% (14459/42524) Receiving objects: 35% (14884/42524) Receiving objects: 36% (15309/42524) Receiving objects: 37% (15734/42524) Receiving objects: 38% (16160/42524) Receiving objects: 39% (16585/42524) Receiving objects: 40% (17010/42524) Receiving objects: 41% (17435/42524) Receiving objects: 42% (17861/42524) Receiving objects: 43% (18286/42524) Receiving objects: 44% (18711/42524) Receiving objects: 45% (19136/42524) Receiving objects: 46% (19562/42524) Receiving objects: 47% (19987/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 48% (20412/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 49% (20837/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 50% (21262/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 51% (21688/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 52% (22113/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 53% (22538/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 54% (22963/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 55% (23389/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 56% (23814/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 57% (24239/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 58% (24664/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 59% (25090/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 60% (25515/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 61% (25940/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 62% (26365/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 63% (26791/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 64% (27216/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 65% (27641/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 66% (28066/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 67% (28492/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 68% (28917/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 69% (29342/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 70% (29767/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 71% (30193/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 72% (30618/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 73% (31043/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 74% (31468/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 75% (31893/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 76% (32319/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 77% (32744/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 78% (33169/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 79% (33594/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 80% (34020/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 81% (34445/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 82% (34870/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 83% (35295/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 84% (35721/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 85% (36146/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 86% (36571/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 87% (36996/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 88% (37422/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 89% (37847/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 90% (38272/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 91% (38697/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 92% (39123/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 93% (39548/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 94% (39973/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 95% (40398/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 96% (40824/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 97% (41249/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 98% (41674/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 99% (42099/42524), 13.33 MiB | 26.65 MiB/s remote: Total 42524 (delta 45), reused 93 (delta 36), pack-reused 42405 Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (42524/42524), 13.33 MiB | 26.65 MiB/s Receiving objects: 100% (42524/42524), 20.62 MiB | 28.72 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/27986) Resolving deltas: 1% (295/27986) Resolving deltas: 2% (577/27986) Resolving deltas: 3% (872/27986) Resolving deltas: 4% (1147/27986) Resolving deltas: 5% (1401/27986) Resolving deltas: 6% (1680/27986) Resolving deltas: 7% (1967/27986) Resolving deltas: 8% (2251/27986) Resolving deltas: 9% (2519/27986) Resolving deltas: 10% (2839/27986) Resolving deltas: 11% (3109/27986) Resolving deltas: 12% (3359/27986) Resolving deltas: 13% (3639/27986) Resolving deltas: 14% (3952/27986) Resolving deltas: 15% (4264/27986) Resolving deltas: 16% (4504/27986) Resolving deltas: 17% (4758/27986) Resolving deltas: 18% (5149/27986) Resolving deltas: 19% (5357/27986) Resolving deltas: 20% (5599/27986) Resolving deltas: 21% (5900/27986) Resolving deltas: 22% (6157/27986) Resolving deltas: 23% (6476/27986) Resolving deltas: 24% (6721/27986) Resolving deltas: 25% (7005/27986) Resolving deltas: 26% (7392/27986) Resolving deltas: 27% (7559/27986) Resolving deltas: 28% (7934/27986) Resolving deltas: 29% (8129/27986) Resolving deltas: 30% (8399/27986) Resolving deltas: 31% (8694/27986) Resolving deltas: 32% (8970/27986) Resolving deltas: 33% (9262/27986) Resolving deltas: 34% (9560/27986) Resolving deltas: 35% (9799/27986) Resolving deltas: 36% (10075/27986) Resolving deltas: 37% (10387/27986) Resolving deltas: 38% (10641/27986) Resolving deltas: 39% (10936/27986) Resolving deltas: 40% (11233/27986) Resolving deltas: 41% (11525/27986) Resolving deltas: 42% (11762/27986) Resolving deltas: 43% (12038/27986) Resolving deltas: 44% (12320/27986) Resolving deltas: 45% (12632/27986) Resolving deltas: 46% (12893/27986) Resolving deltas: 47% (13158/27986) Resolving deltas: 48% (13437/27986) Resolving deltas: 49% (13715/27986) Resolving deltas: 50% (14029/27986) Resolving deltas: 51% (14305/27986) Resolving deltas: 54% (15311/27986) Resolving deltas: 55% (15479/27986) Resolving deltas: 56% (15733/27986) Resolving deltas: 57% (16141/27986) Resolving deltas: 58% (16313/27986) Resolving deltas: 59% (16548/27986) Resolving deltas: 60% (16829/27986) Resolving deltas: 61% (17088/27986) Resolving deltas: 62% (17353/27986) Resolving deltas: 63% (17672/27986) Resolving deltas: 64% (18021/27986) Resolving deltas: 65% (18217/27986) Resolving deltas: 66% (18503/27986) Resolving deltas: 67% (18756/27986) Resolving deltas: 68% (19033/27986) Resolving deltas: 69% (19417/27986) Resolving deltas: 70% (19591/27986) Resolving deltas: 71% (19873/27986) Resolving deltas: 72% (20165/27986) Resolving deltas: 73% (20445/27986) Resolving deltas: 74% (20864/27986) Resolving deltas: 75% (21023/27986) Resolving deltas: 76% (21385/27986) Resolving deltas: 77% (21727/27986) Resolving deltas: 78% (21856/27986) Resolving deltas: 79% (22111/27986) Resolving deltas: 80% (22478/27986) Resolving deltas: 81% (22674/27986) Resolving deltas: 82% (23058/27986) Resolving deltas: 83% (23255/27986) Resolving deltas: 84% (23520/27986) Resolving deltas: 85% (23791/27986) Resolving deltas: 86% (24068/27986) Resolving deltas: 87% (24358/27986) Resolving deltas: 88% (24637/27986) Resolving deltas: 89% (24943/27986) Resolving deltas: 90% (25224/27986) Resolving deltas: 91% (25510/27986) Resolving deltas: 92% (25750/27986) Resolving deltas: 93% (26035/27986) Resolving deltas: 94% (26319/27986) Resolving deltas: 95% (26593/27986) Resolving deltas: 96% (26878/27986) Resolving deltas: 97% (27147/27986) Resolving deltas: 98% (27530/27986) Resolving deltas: 99% (27743/27986) Resolving deltas: 100% (27986/27986) Resolving deltas: 100% (27986/27986), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.12-16-g007abf31 -X main.version=1.1.12+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=29a6ab8.m -X github.com/containerd/containerd/v2/version.Revision=29a6ab82611bbec7e01cd43182d4fa38a79cc86d.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=29a6ab8.m -X github.com/containerd/containerd/v2/version.Revision=29a6ab82611bbec7e01cd43182d4fa38a79cc86d.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=29a6ab8.m -X github.com/containerd/containerd/v2/version.Revision=29a6ab82611bbec7e01cd43182d4fa38a79cc86d.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*data' compile_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegNoTearDownWithDownload(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerNoTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerWithTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 9f80bca35359: Already exists Step #4: c2e9ab7e6d55: Already exists Step #4: 34329875bf35: Pulling fs layer Step #4: 4ef379a667ce: Pulling fs layer Step #4: 90815380e3de: Pulling fs layer Step #4: a59c863bb923: Pulling fs layer Step #4: dce8e8465201: Pulling fs layer Step #4: f7a1ab9755fe: Pulling fs layer Step #4: 453b65b09a13: Pulling fs layer Step #4: 3fd132016e48: Pulling fs layer Step #4: 219f663a713b: Pulling fs layer Step #4: b4ac4ea952f9: Pulling fs layer Step #4: 98f9214581fe: Pulling fs layer Step #4: 6a01e16b5a30: Pulling fs layer Step #4: 7cce4d76b05d: Pulling fs layer Step #4: 4125849e1150: Pulling fs layer Step #4: a59c863bb923: Waiting Step #4: dce8e8465201: Waiting Step #4: f7a1ab9755fe: Waiting Step #4: 98f9214581fe: Waiting Step #4: 6a01e16b5a30: Waiting Step #4: 4125849e1150: Waiting Step #4: 219f663a713b: Waiting Step #4: b4ac4ea952f9: Waiting Step #4: 3fd132016e48: Waiting Step #4: 90815380e3de: Verifying Checksum Step #4: 90815380e3de: Download complete Step #4: 34329875bf35: Verifying Checksum Step #4: 34329875bf35: Download complete Step #4: 4ef379a667ce: Verifying Checksum Step #4: 4ef379a667ce: Download complete Step #4: f7a1ab9755fe: Verifying Checksum Step #4: f7a1ab9755fe: Download complete Step #4: dce8e8465201: Verifying Checksum Step #4: dce8e8465201: Download complete Step #4: 34329875bf35: Pull complete Step #4: 453b65b09a13: Verifying Checksum Step #4: 453b65b09a13: Download complete Step #4: 219f663a713b: Verifying Checksum Step #4: 219f663a713b: Download complete Step #4: 3fd132016e48: Verifying Checksum Step #4: 3fd132016e48: Download complete Step #4: 4ef379a667ce: Pull complete Step #4: 98f9214581fe: Verifying Checksum Step #4: 98f9214581fe: Download complete Step #4: 90815380e3de: Pull complete Step #4: 6a01e16b5a30: Verifying Checksum Step #4: 6a01e16b5a30: Download complete Step #4: a59c863bb923: Verifying Checksum Step #4: a59c863bb923: Download complete Step #4: 4125849e1150: Download complete Step #4: b4ac4ea952f9: Verifying Checksum Step #4: b4ac4ea952f9: Download complete Step #4: 7cce4d76b05d: Download complete Step #4: a59c863bb923: Pull complete Step #4: dce8e8465201: Pull complete Step #4: f7a1ab9755fe: Pull complete Step #4: 453b65b09a13: Pull complete Step #4: 3fd132016e48: Pull complete Step #4: 219f663a713b: Pull complete Step #4: b4ac4ea952f9: Pull complete Step #4: 98f9214581fe: Pull complete Step #4: 6a01e16b5a30: Pull complete Step #4: 7cce4d76b05d: Pull complete Step #4: 4125849e1150: Pull complete Step #4: Digest: sha256:318fe6ad2cc701012a20a7432786802ca2d2788eb46e7c0dbd9087f0b5457c59 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_FuzzCRIServer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzCRIServer.zip or Step #5: /corpus/fuzz_FuzzCRIServer.zip.zip, and cannot find /corpus/fuzz_FuzzCRIServer.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzCRIServer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_FuzzContainerdImport.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzContainerdImport.zip or Step #5: /corpus/fuzz_FuzzContainerdImport.zip.zip, and cannot find /corpus/fuzz_FuzzContainerdImport.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzContainerdImport. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/fuzz_FuzzIntegNoTearDownWithDownload.zip]: zipfile is empty Step #5: Failed to unpack the corpus for fuzz_FuzzIntegNoTearDownWithDownload. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: Running go target fuzz_FuzzContainerdImport Step #5: cp: cannot stat '/corpus/fuzz_FuzzContainerdImport/': No such file or directory Step #5: Running go target fuzz_FuzzCRIServer Step #5: cp: cannot stat '/corpus/fuzz_FuzzCRIServer/': No such file or directory Step #5: Running go target fuzz_FuzzParseAuth Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffApply Step #5: Running go target fuzz_FuzzImagesCheck Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzExchange Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: Running go target fuzz_FuzzUUIDParse Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImageStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2024/05/12 06:15:40 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImportIndex Step #5: Running go target fuzz_FuzzDiffCompare Step #5: Running go target fuzz_FuzzCSWalk Step #5: Running go target fuzz_FuzzFetcher Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDecompressStream Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzUUIDParse: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzUUIDParse/0070be2078c1a4bd591572ac5df9c64c25210943 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 10.3% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzLeaseManager Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzParseAuth: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzParseAuth/005222f7d566bd19097864fff37fddc16c0994c8 context deadline exceeded Step #5: FAIL Step #5: coverage: 3.4% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzDiffApply: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/00cd3a5ccb687152bd5a6eb27d8183901f7008cc context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/00cd3a5ccb687152bd5a6eb27d8183901f7008cc non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.2% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzConvertManifest Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzApply Step #5: Running go target fuzz_FuzzContentStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzFiltersParse Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2024/05/12 06:16:09 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: Error occured while running fuzz_FuzzImagesCheck: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/012956e307e4fecd934c1d2074595e0b1dcb39ab context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/012956e307e4fecd934c1d2074595e0b1dcb39ab non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.7% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzExchange: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/001679bdd36dc5dfee2869590d457409dac18c0c context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/001679bdd36dc5dfee2869590d457409dac18c0c non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 4.7% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: cp: cannot stat '/corpus/fuzz_FuzzIntegNoTearDownWithDownload/': No such file or directory Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: Running go target fuzz_FuzzArchiveExport Step #5: 2024/05/12 06:16:13 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzImageStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/002c940f0a9124104a057fb09579deb484be10f5 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/002c940f0a9124104a057fb09579deb484be10f5 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.9% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzDiffCompare: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffCompare/001ac321f3ccb46e4bfb046054bf5514bcebfaba non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 11.0% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzLeaseManager: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/0035be6672b65ac08157ccac3570f8ebfa50cfa5 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/0035be6672b65ac08157ccac3570f8ebfa50cfa5 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.9% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContentStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/00e53913a17de158ef00ee8296e07c986cbb4f15 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/00e53913a17de158ef00ee8296e07c986cbb4f15 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.7% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContainerStore: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002df450d361e417f68a87b3d4c2211b773f8f41 context deadline exceeded Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002df450d361e417f68a87b3d4c2211b773f8f41 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 11.2% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzArchiveExport: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.01s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzArchiveExport/00185fc2d0d5c264ee60ab77ea197c720a264da8 context deadline exceeded Step #5: FAIL Step #5: coverage: 3.3% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzCSWalk: Step #5: --- FAIL: TestFuzzContainerdImportCorpus (10.00s) Step #5: fuzzcontainerdimport_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzCSWalk/012e2b12cac03adde056a51a1b0cc83a5db8ebb1 context deadline exceeded Step #5: FAIL Step #5: coverage: 8.6% of statements in github.com/containerd/containerd/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2024/05/12 06:18:18 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzCRIServer.perf.cpu.prof": parsing profile: empty input file Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.3 MiB] 0% Done / [0/4 files][ 0.0 B/ 8.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/4 files][ 0.0 B/ 8.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.3 MiB] 0% Done / [1/4 files][391.4 KiB/ 8.3 MiB] 4% Done / [2/4 files][919.4 KiB/ 8.3 MiB] 10% Done / [3/4 files][ 8.3 MiB/ 8.3 MiB] 99% Done / [4/4 files][ 8.3 MiB/ 8.3 MiB] 100% Done Step #7: Operation completed over 4 objects/8.3 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.2 MiB] 0% Done / [1/30 files][625.4 KiB/ 3.2 MiB] 18% Done / [2/30 files][625.4 KiB/ 3.2 MiB] 18% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [2/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [2/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [3/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [4/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [4/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [5/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: / [5/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [6/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [7/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [7/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [7/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: / [7/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [8/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: / [9/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [9/30 files][870.6 KiB/ 3.2 MiB] 26% Done / [10/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [10/30 files][870.6 KiB/ 3.2 MiB] 26% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzUUIDParse.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.0 MiB/ 3.2 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.0 MiB/ 3.2 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.0 MiB/ 3.2 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.0 MiB/ 3.2 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.2 MiB/ 3.2 MiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.3 MiB/ 3.2 MiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.3 MiB/ 3.2 MiB] 38% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: / [11/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [11/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [11/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: / [11/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: / [11/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [12/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [13/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [14/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [15/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [16/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done / [17/30 files][ 1.6 MiB/ 3.2 MiB] 50% Done - - [18/30 files][ 2.8 MiB/ 3.2 MiB] 87% Done - [19/30 files][ 2.8 MiB/ 3.2 MiB] 87% Done - [20/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [21/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [22/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [23/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [24/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [25/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [26/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [27/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [28/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [29/30 files][ 3.2 MiB/ 3.2 MiB] 99% Done - [30/30 files][ 3.2 MiB/ 3.2 MiB] 100% Done Step #9: Operation completed over 30 objects/3.2 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 7.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 77.0 B/ 7.3 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 77.0 B/ 7.3 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 77.0 B/ 7.3 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 77.0 B/ 7.3 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 77.0 B/ 7.3 KiB] 1% Done / [1/29 files][ 190.0 B/ 7.3 KiB] 2% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 379.0 B/ 7.3 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 379.0 B/ 7.3 KiB] 5% Done / [2/29 files][ 379.0 B/ 7.3 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: / [2/29 files][ 379.0 B/ 7.3 KiB] 5% Done / [3/29 files][ 379.0 B/ 7.3 KiB] 5% Done / [4/29 files][ 379.0 B/ 7.3 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [4/29 files][ 379.0 B/ 7.3 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [4/29 files][ 457.0 B/ 7.3 KiB] 6% Done / [5/29 files][ 729.0 B/ 7.3 KiB] 9% Done / [6/29 files][ 1.4 KiB/ 7.3 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done / [7/29 files][ 1.9 KiB/ 7.3 KiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [7/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [7/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [7/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [8/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [9/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [10/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [10/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [10/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [11/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done / [12/29 files][ 2.0 KiB/ 7.3 KiB] 27% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzUUIDParse.log [Content-Type=application/octet-stream]... Step #11: / [12/29 files][ 2.4 KiB/ 7.3 KiB] 33% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [12/29 files][ 2.4 KiB/ 7.3 KiB] 33% Done / [12/29 files][ 2.4 KiB/ 7.3 KiB] 33% Done / [13/29 files][ 3.1 KiB/ 7.3 KiB] 42% Done / [14/29 files][ 3.1 KiB/ 7.3 KiB] 42% Done / [15/29 files][ 4.5 KiB/ 7.3 KiB] 61% Done / [16/29 files][ 4.6 KiB/ 7.3 KiB] 62% Done - - [17/29 files][ 6.8 KiB/ 7.3 KiB] 92% Done - [18/29 files][ 6.8 KiB/ 7.3 KiB] 92% Done - [19/29 files][ 7.0 KiB/ 7.3 KiB] 95% Done - [20/29 files][ 7.0 KiB/ 7.3 KiB] 95% Done - [21/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [22/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [23/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [24/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [25/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [26/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [27/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [28/29 files][ 7.3 KiB/ 7.3 KiB] 99% Done - [29/29 files][ 7.3 KiB/ 7.3 KiB] 100% Done Step #11: Operation completed over 29 objects/7.3 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1664 --:--:-- --:--:-- --:--:-- 1673 Finished Step #13 PUSH DONE