starting build "6798a051-ecbf-4ed0-a2e3-77fbcecc06b9" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 6efd9f783a42: Pulling fs layer Step #1: 9cf1d2b7eac8: Pulling fs layer Step #1: dda1a8d8c948: Pulling fs layer Step #1: f01f2532e9f2: Pulling fs layer Step #1: 859febdd15d2: Pulling fs layer Step #1: a11f60474d4d: Pulling fs layer Step #1: 6b57c1f93efd: Pulling fs layer Step #1: 1846e7376602: Pulling fs layer Step #1: 08962b9d9afd: Pulling fs layer Step #1: bdce07a73c5c: Pulling fs layer Step #1: f35ffd62ba04: Pulling fs layer Step #1: ebdf9449e437: Pulling fs layer Step #1: 7b476b09b3ca: Pulling fs layer Step #1: 8c0193663acf: Pulling fs layer Step #1: c88df95a4d22: Pulling fs layer Step #1: 72e58dd70e29: Pulling fs layer Step #1: 6da86fbfeadb: Pulling fs layer Step #1: 6f77a39fc42d: Pulling fs layer Step #1: d9bbcca79b36: Pulling fs layer Step #1: faa64a7280d9: Pulling fs layer Step #1: ab09445f7d12: Pulling fs layer Step #1: 97b497f4e6e7: Pulling fs layer Step #1: a330d3c82481: Pulling fs layer Step #1: 68a831f39b5a: Pulling fs layer Step #1: c181730fe761: Pulling fs layer Step #1: bb5c9ce5316f: Pulling fs layer Step #1: 5487b8272cdc: Pulling fs layer Step #1: 8c0193663acf: Waiting Step #1: c88df95a4d22: Waiting Step #1: 72e58dd70e29: Waiting Step #1: 6da86fbfeadb: Waiting Step #1: 6f77a39fc42d: Waiting Step #1: d9bbcca79b36: Waiting Step #1: faa64a7280d9: Waiting Step #1: ab09445f7d12: Waiting Step #1: 97b497f4e6e7: Waiting Step #1: a330d3c82481: Waiting Step #1: 5487b8272cdc: Waiting Step #1: 68a831f39b5a: Waiting Step #1: c181730fe761: Waiting Step #1: bb5c9ce5316f: Waiting Step #1: 1846e7376602: Waiting Step #1: 08962b9d9afd: Waiting Step #1: dda1a8d8c948: Waiting Step #1: f01f2532e9f2: Waiting Step #1: bdce07a73c5c: Waiting Step #1: 6b57c1f93efd: Waiting Step #1: 859febdd15d2: Waiting Step #1: f35ffd62ba04: Waiting Step #1: a11f60474d4d: Waiting Step #1: 7b476b09b3ca: Waiting Step #1: 9cf1d2b7eac8: Verifying Checksum Step #1: 9cf1d2b7eac8: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f01f2532e9f2: Verifying Checksum Step #1: dda1a8d8c948: Verifying Checksum Step #1: dda1a8d8c948: Download complete Step #1: 859febdd15d2: Verifying Checksum Step #1: 859febdd15d2: Download complete Step #1: 6b57c1f93efd: Verifying Checksum Step #1: 6b57c1f93efd: Download complete Step #1: 1846e7376602: Verifying Checksum Step #1: 1846e7376602: Download complete Step #1: 6efd9f783a42: Verifying Checksum Step #1: 6efd9f783a42: Download complete Step #1: bdce07a73c5c: Verifying Checksum Step #1: bdce07a73c5c: Download complete Step #1: f35ffd62ba04: Verifying Checksum Step #1: f35ffd62ba04: Download complete Step #1: b549f31133a9: Pull complete Step #1: ebdf9449e437: Download complete Step #1: 7b476b09b3ca: Verifying Checksum Step #1: 7b476b09b3ca: Download complete Step #1: 8c0193663acf: Verifying Checksum Step #1: 8c0193663acf: Download complete Step #1: c88df95a4d22: Verifying Checksum Step #1: c88df95a4d22: Download complete Step #1: 72e58dd70e29: Verifying Checksum Step #1: 72e58dd70e29: Download complete Step #1: 08962b9d9afd: Verifying Checksum Step #1: 08962b9d9afd: Download complete Step #1: 6da86fbfeadb: Verifying Checksum Step #1: 6da86fbfeadb: Download complete Step #1: 6f77a39fc42d: Verifying Checksum Step #1: 6f77a39fc42d: Download complete Step #1: d9bbcca79b36: Verifying Checksum Step #1: d9bbcca79b36: Download complete Step #1: faa64a7280d9: Download complete Step #1: 97b497f4e6e7: Verifying Checksum Step #1: 97b497f4e6e7: Download complete Step #1: ab09445f7d12: Verifying Checksum Step #1: ab09445f7d12: Download complete Step #1: a330d3c82481: Download complete Step #1: c181730fe761: Verifying Checksum Step #1: c181730fe761: Download complete Step #1: 68a831f39b5a: Verifying Checksum Step #1: 68a831f39b5a: Download complete Step #1: 5487b8272cdc: Verifying Checksum Step #1: 5487b8272cdc: Download complete Step #1: a11f60474d4d: Verifying Checksum Step #1: a11f60474d4d: Download complete Step #1: 6efd9f783a42: Pull complete Step #1: 9cf1d2b7eac8: Pull complete Step #1: bb5c9ce5316f: Verifying Checksum Step #1: bb5c9ce5316f: Download complete Step #1: dda1a8d8c948: Pull complete Step #1: f01f2532e9f2: Pull complete Step #1: 859febdd15d2: Pull complete Step #1: a11f60474d4d: Pull complete Step #1: 6b57c1f93efd: Pull complete Step #1: 1846e7376602: Pull complete Step #1: 08962b9d9afd: Pull complete Step #1: bdce07a73c5c: Pull complete Step #1: f35ffd62ba04: Pull complete Step #1: ebdf9449e437: Pull complete Step #1: 7b476b09b3ca: Pull complete Step #1: 8c0193663acf: Pull complete Step #1: c88df95a4d22: Pull complete Step #1: 72e58dd70e29: Pull complete Step #1: 6da86fbfeadb: Pull complete Step #1: 6f77a39fc42d: Pull complete Step #1: d9bbcca79b36: Pull complete Step #1: faa64a7280d9: Pull complete Step #1: ab09445f7d12: Pull complete Step #1: 97b497f4e6e7: Pull complete Step #1: a330d3c82481: Pull complete Step #1: 68a831f39b5a: Pull complete Step #1: c181730fe761: Pull complete Step #1: bb5c9ce5316f: Pull complete Step #1: 5487b8272cdc: Pull complete Step #1: Digest: sha256:e8a5aee1c34113ce5ff94f8c7e3f3212723b6987e00080f0396ab4b6695bb4d2 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 3600b6bd4f21 Step #1: Step 2/5 : RUN git clone https://github.com/google/gvisor Step #1: ---> Running in fa1ce8559d33 Step #1: Cloning into 'gvisor'... Step #1: Removing intermediate container fa1ce8559d33 Step #1: ---> 91ba73df7d83 Step #1: Step 3/5 : COPY build.sh state_fuzzer.go $SRC/ Step #1: ---> 52464aac95a2 Step #1: Step 4/5 : ENV GVISOR_ROOT $SRC/gvisor Step #1: ---> Running in ff6aed1942ba Step #1: Removing intermediate container ff6aed1942ba Step #1: ---> 54aa3d61ff4b Step #1: Step 5/5 : WORKDIR $GVISOR_ROOT Step #1: ---> Running in 6b49e4394ee7 Step #1: Removing intermediate container 6b49e4394ee7 Step #1: ---> 7c57dea191a9 Step #1: Successfully built 7c57dea191a9 Step #1: Successfully tagged gcr.io/oss-fuzz/gvisor:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gvisor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileoDzY0M Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gvisor/.git Step #2 - "srcmap": + GIT_DIR=/src/gvisor Step #2 - "srcmap": + cd /src/gvisor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gvisor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=5a6447f491af0530e9e3a1985ed996817410b818 Step #2 - "srcmap": + jq_inplace /tmp/fileoDzY0M '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "5a6447f491af0530e9e3a1985ed996817410b818" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileL9iMLc Step #2 - "srcmap": + cat /tmp/fileoDzY0M Step #2 - "srcmap": + jq '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "5a6447f491af0530e9e3a1985ed996817410b818" }' Step #2 - "srcmap": + mv /tmp/fileL9iMLc /tmp/fileoDzY0M Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileoDzY0M Step #2 - "srcmap": + rm /tmp/fileoDzY0M Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gvisor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gvisor", Step #2 - "srcmap": "rev": "5a6447f491af0530e9e3a1985ed996817410b818" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + git checkout go Step #3 - "compile-libfuzzer-coverage-x86_64": Branch 'go' set up to track remote branch 'go' from 'origin'. Step #3 - "compile-libfuzzer-coverage-x86_64": Switched to a new branch 'go' Step #3 - "compile-libfuzzer-coverage-x86_64": + mv /src/state_fuzzer.go /src/gvisor/ Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer gvisor.dev/gvisor FuzzStateLoad state_load_fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/gvisor.dev/gvisor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: go.mod file indicates go 1.20, but maximum version supported by tidy is 1.19 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.0.0-20220210224613-90d013bbcef8 Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": # gvisor.dev/gvisor [gvisor.dev/gvisor.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzstateload_test.go:33:32: undefined: filename Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzstateload_test.go:45:2: infos declared but not used Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzstateload_test.go:50:2: filename declared but not used Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzstateload_test.go:52:54: undefined: fs Step #3 - "compile-libfuzzer-coverage-x86_64": note: module requires Go 1.20 Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 gvisor Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1