starting build "6cb7a703-979d-4947-b21b-04e4cde0895c" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9" Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Sending build context to Docker daemon 5.12kB Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go:ubuntu-24-04 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ubuntu-24-04: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76249c7cd503: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6c4381f00051: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a7deedbbc981: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0dc101ecc326: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 11a1bc548828: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5fe0d26d7ea0: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": bc66da3ca5b8: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5158ef8b5e10: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": d8b0a4022d18: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 19711d87ed8b: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": da6bb142b02b: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76d0355787f5: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f5d167561d10: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 347c6e8df6e1: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0fa7424e82c5: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a23315e11385: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a52e32dfbea1: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 2fcfb88675ac: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 92d41d34f8b6: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9dbb0c4c1869: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6b3cbff96816: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0a6cfcc6c120: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fa3555f3d3b: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": bc66da3ca5b8: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ef994a2516da: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b68f957e897b: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 154f8d298dbc: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 286b3abbcab2: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ff245d441c7b: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 1817aa7ce93f: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fcf6f5de977: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b28c2c847434: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f47c272a2d82: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 84c76ac5297d: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5158ef8b5e10: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 030a64bda0a1: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f563910ee300: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5c60793dd5a7: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": d8b0a4022d18: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76d0355787f5: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 37b9ebcc6b62: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 99fcaae2d361: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 19711d87ed8b: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": aea02e72b647: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f5d167561d10: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 65a257f45f38: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6813db1d6ade: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": eee44b26ebbc: Pulling fs layer Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0a6cfcc6c120: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": da6bb142b02b: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 347c6e8df6e1: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b28c2c847434: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 84c76ac5297d: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5c60793dd5a7: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 99fcaae2d361: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": aea02e72b647: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 154f8d298dbc: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 65a257f45f38: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 030a64bda0a1: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fcf6f5de977: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6813db1d6ade: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 92d41d34f8b6: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 37b9ebcc6b62: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a52e32dfbea1: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0fa7424e82c5: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ef994a2516da: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b68f957e897b: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 1817aa7ce93f: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 2fcfb88675ac: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f563910ee300: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6b3cbff96816: Waiting Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5fe0d26d7ea0: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5fe0d26d7ea0: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 11a1bc548828: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 11a1bc548828: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a7deedbbc981: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5158ef8b5e10: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5158ef8b5e10: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": d8b0a4022d18: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0dc101ecc326: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0dc101ecc326: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76d0355787f5: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76d0355787f5: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76249c7cd503: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76249c7cd503: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f5d167561d10: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f5d167561d10: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 347c6e8df6e1: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 347c6e8df6e1: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0fa7424e82c5: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": da6bb142b02b: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": da6bb142b02b: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a23315e11385: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a23315e11385: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6c4381f00051: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6c4381f00051: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a52e32dfbea1: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a52e32dfbea1: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9dbb0c4c1869: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9dbb0c4c1869: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 2fcfb88675ac: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 92d41d34f8b6: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 92d41d34f8b6: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6b3cbff96816: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6b3cbff96816: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0a6cfcc6c120: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0a6cfcc6c120: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fa3555f3d3b: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b68f957e897b: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b68f957e897b: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ef994a2516da: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ef994a2516da: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 154f8d298dbc: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 286b3abbcab2: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ff245d441c7b: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ff245d441c7b: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 1817aa7ce93f: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 1817aa7ce93f: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fcf6f5de977: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fcf6f5de977: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f47c272a2d82: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76249c7cd503: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b28c2c847434: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b28c2c847434: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f563910ee300: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 19711d87ed8b: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 19711d87ed8b: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5c60793dd5a7: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5c60793dd5a7: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 37b9ebcc6b62: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 37b9ebcc6b62: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 84c76ac5297d: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 84c76ac5297d: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 99fcaae2d361: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 99fcaae2d361: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 030a64bda0a1: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 030a64bda0a1: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": aea02e72b647: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": aea02e72b647: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 65a257f45f38: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 65a257f45f38: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": eee44b26ebbc: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": eee44b26ebbc: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": bc66da3ca5b8: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": bc66da3ca5b8: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6813db1d6ade: Verifying Checksum Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6813db1d6ade: Download complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6c4381f00051: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a7deedbbc981: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0dc101ecc326: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 11a1bc548828: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5fe0d26d7ea0: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": bc66da3ca5b8: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5158ef8b5e10: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": d8b0a4022d18: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 19711d87ed8b: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": da6bb142b02b: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 76d0355787f5: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f5d167561d10: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 347c6e8df6e1: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0fa7424e82c5: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a23315e11385: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": a52e32dfbea1: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 2fcfb88675ac: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 92d41d34f8b6: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9dbb0c4c1869: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6b3cbff96816: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0a6cfcc6c120: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fa3555f3d3b: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ef994a2516da: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b68f957e897b: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 154f8d298dbc: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 286b3abbcab2: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ff245d441c7b: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 1817aa7ce93f: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 9fcf6f5de977: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": b28c2c847434: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f47c272a2d82: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 84c76ac5297d: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 030a64bda0a1: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": f563910ee300: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 5c60793dd5a7: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 37b9ebcc6b62: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 99fcaae2d361: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": aea02e72b647: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 65a257f45f38: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 6813db1d6ade: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": eee44b26ebbc: Pull complete Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Digest: sha256:364bf5c59149c2f73ea01f5393deb11411b416a0ec6c43bc47ae7301fe7445e3 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:ubuntu-24-04 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> 327ec21ba2d4 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> Running in 72dc48edc8f6 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Hit:1 http://security.ubuntu.com/ubuntu noble-security InRelease Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Hit:2 http://archive.ubuntu.com/ubuntu noble InRelease Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Hit:3 http://archive.ubuntu.com/ubuntu noble-updates InRelease Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Hit:4 http://archive.ubuntu.com/ubuntu noble-backports InRelease Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Reading package lists... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Reading package lists... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Building dependency tree... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Reading state information... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": libc6-dev is already the newest version (2.39-0ubuntu8.7). Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": gcc is already the newest version (4:13.2.0-7ubuntu1). Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": gcc set to manually installed. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": wget is already the newest version (1.21.4-1ubuntu4.1). Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": The following packages were automatically installed and are no longer required: Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": autotools-dev m4 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Use 'apt autoremove' to remove them. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": The following additional packages will be installed: Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": libbtrfs0t64 liblzo2-2 libpkgconf3 libreiserfscore0t64 pkgconf pkgconf-bin Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Suggested packages: Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": duperemove seccomp Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": The following NEW packages will be installed: Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": btrfs-progs libbtrfs-dev libbtrfs0t64 liblzo2-2 libpkgconf3 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": libreiserfscore0t64 libseccomp-dev pkg-config pkgconf pkgconf-bin Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": 0 upgraded, 10 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Need to get 1344 kB of archives. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": After this operation, 6405 kB of additional disk space will be used. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:1 http://archive.ubuntu.com/ubuntu noble/main amd64 liblzo2-2 amd64 2.10-2build4 [54.1 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:2 http://archive.ubuntu.com/ubuntu noble/main amd64 libreiserfscore0t64 amd64 1:3.6.27-7.1build1 [76.2 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:3 http://archive.ubuntu.com/ubuntu noble/main amd64 btrfs-progs amd64 6.6.3-1.1build2 [984 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:4 http://archive.ubuntu.com/ubuntu noble/main amd64 libbtrfs0t64 amd64 6.6.3-1.1build2 [13.3 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:5 http://archive.ubuntu.com/ubuntu noble/main amd64 libbtrfs-dev amd64 6.6.3-1.1build2 [49.0 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:6 http://archive.ubuntu.com/ubuntu noble/main amd64 libpkgconf3 amd64 1.8.1-2build1 [30.7 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:7 http://archive.ubuntu.com/ubuntu noble-updates/main amd64 libseccomp-dev amd64 2.5.5-1ubuntu3.1 [92.3 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:8 http://archive.ubuntu.com/ubuntu noble/main amd64 pkgconf-bin amd64 1.8.1-2build1 [20.7 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:9 http://archive.ubuntu.com/ubuntu noble/main amd64 pkgconf amd64 1.8.1-2build1 [16.8 kB] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Get:10 http://archive.ubuntu.com/ubuntu noble/main amd64 pkg-config amd64 1.8.1-2build1 [7264 B] Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Fetched 1344 kB in 0s (8318 kB/s) Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package liblzo2-2:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17624 files and directories currently installed.) Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../0-liblzo2-2_2.10-2build4_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking liblzo2-2:amd64 (2.10-2build4) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package libreiserfscore0t64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../1-libreiserfscore0t64_1%3a3.6.27-7.1build1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking libreiserfscore0t64 (1:3.6.27-7.1build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package btrfs-progs. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../2-btrfs-progs_6.6.3-1.1build2_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking btrfs-progs (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package libbtrfs0t64:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../3-libbtrfs0t64_6.6.3-1.1build2_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking libbtrfs0t64:amd64 (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package libbtrfs-dev:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../4-libbtrfs-dev_6.6.3-1.1build2_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking libbtrfs-dev:amd64 (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package libpkgconf3:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../5-libpkgconf3_1.8.1-2build1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking libpkgconf3:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package libseccomp-dev:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../6-libseccomp-dev_2.5.5-1ubuntu3.1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking libseccomp-dev:amd64 (2.5.5-1ubuntu3.1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package pkgconf-bin. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../7-pkgconf-bin_1.8.1-2build1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking pkgconf-bin (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package pkgconf:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../8-pkgconf_1.8.1-2build1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking pkgconf:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Selecting previously unselected package pkg-config:amd64. Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Preparing to unpack .../9-pkg-config_1.8.1-2build1_amd64.deb ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Unpacking pkg-config:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up libseccomp-dev:amd64 (2.5.5-1ubuntu3.1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up libreiserfscore0t64 (1:3.6.27-7.1build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up liblzo2-2:amd64 (2.10-2build4) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up libpkgconf3:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up pkgconf-bin (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up libbtrfs0t64:amd64 (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up libbtrfs-dev:amd64 (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up btrfs-progs (6.6.3-1.1build2) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up pkgconf:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Setting up pkg-config:amd64 (1.8.1-2build1) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Processing triggers for libc-bin (2.39-0ubuntu8.7) ... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Removing intermediate container 72dc48edc8f6 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> f38acd5b0ab9 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> Running in 859bbc05447f Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Cloning into 'containerd'... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Removing intermediate container 859bbc05447f Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> 09dd8fe1f0dd Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 4/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> Running in 184626fb868d Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Cloning into 'instrumentation'... Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Removing intermediate container 184626fb868d Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> ce34861e707d Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> 5708f9c1689e Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Step 6/6 : WORKDIR $SRC/containerd Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> Running in e88bd430ffd3 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Removing intermediate container e88bd430ffd3 Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": ---> 85a6fdadfedb Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Successfully built 85a6fdadfedb Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Successfully tagged gcr.io/oss-fuzz/containerd:latest Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/containerd:latest Finished Step #1 - "build-d594ea67-cb0d-48fd-acaa-4875e82e69f9" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + SRCMAP=/tmp/fileaCMYM0 Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/fileaCMYM0 '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/file8KnoPe Step #2 - "srcmap": + cat /tmp/fileaCMYM0 Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/file8KnoPe /tmp/fileaCMYM0 Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81 Step #2 - "srcmap": + jq_inplace /tmp/fileaCMYM0 '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": WARNING: tempfile is deprecated; consider using mktemp instead. Step #2 - "srcmap": + F=/tmp/file5lh3nf Step #2 - "srcmap": + cat /tmp/fileaCMYM0 Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81" }' Step #2 - "srcmap": + mv /tmp/file5lh3nf /tmp/fileaCMYM0 Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileaCMYM0 Step #2 - "srcmap": + rm /tmp/fileaCMYM0 Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu noble InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:2 http://security.ubuntu.com/ubuntu noble-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] Hit:3 http://archive.ubuntu.com/ubuntu noble-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Waiting for headers] Hit:4 http://archive.ubuntu.com/ubuntu noble-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 38% Reading package lists... 38% Reading package lists... 39% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 57% Reading package lists... 57% Reading package lists... 57% Reading package lists... 57% Reading package lists... 62% Reading package lists... 62% Reading package lists... 63% Reading package lists... 63% Reading package lists... 68% Reading package lists... 68% Reading package lists... 71% Reading package lists... 71% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 85% Reading package lists... 85% Reading package lists... 86% Reading package lists... 86% Reading package lists... 89% Reading package lists... 89% Reading package lists... 91% Reading package lists... 91% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 38% Reading package lists... 38% Reading package lists... 39% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 56% Reading package lists... 57% Reading package lists... 57% Reading package lists... 57% Reading package lists... 57% Reading package lists... 62% Reading package lists... 62% Reading package lists... 63% Reading package lists... 63% Reading package lists... 68% Reading package lists... 68% Reading package lists... 71% Reading package lists... 71% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 80% Reading package lists... 85% Reading package lists... 85% Reading package lists... 86% Reading package lists... 86% Reading package lists... 89% Reading package lists... 89% Reading package lists... 91% Reading package lists... 91% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 29% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.21.4-1ubuntu4.1). Step #3 - "compile-libfuzzer-coverage-x86_64": The following packages were automatically installed and are no longer required: Step #3 - "compile-libfuzzer-coverage-x86_64": autotools-dev m4 Step #3 - "compile-libfuzzer-coverage-x86_64": Use 'apt autoremove' to remove them. Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.26.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.26.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package client\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.1.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd/api v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.27.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v1.0.0-rc.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.3-0.20251027160822-ad3df93bed29 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.15.0-rc.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.81.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.12-0.20260120151049-f2248ac996af Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v7 v7.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.13 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.20.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.68.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/vsock v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/otelttrpc v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/zfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.23.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20260406210006-6f92a3bedf2d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-client v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.19.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/checkpointctl v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sasha-s/go-deadlock v0.3.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.140.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.68.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20251114084447-edf4cb3d2116 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.52.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-streaming v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20260319190234-28399d86e0b5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/imgcrypt/v2 v2.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.15.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/streaming v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.43.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/erofs/go-erofs v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-dmverity v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/certtostore v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.67.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/petermattis/goid v0.0.0-20240813172612-4fcff4a6cae7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.38.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.25.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v2 v2.4.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.yaml.in/yaml/v3 v3.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/capability v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/knqyf263/go-plugin v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tetratelabs/wazero v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/brianvoe/gofakeit/v7 v7.12.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/randfill v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mistifyio/go-zfs/v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/StackExchange/wmi v0.0.0-20190523213315-cbe66965904d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/deck v0.0.0-20230104221208-105ad94aa8ae Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.49.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containers/ocicrypt v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.4-0.20250319132907-e064f32e3674 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v5 v5.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading cyphar.com/go-pathrs v0.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-ole/go-ole v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.14.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20250730193827-2d320260d730 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.41.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gonum.org/v1/gonum v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20241129210726-2c02b8208cf8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.1.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stefanberger/go-pkcs11uri v0.0.0-20230803200340-78284954bff6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smallstep/pkcs7 v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/automaxprocs v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Masterminds/semver/v3 v3.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.44.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20250820193118-f64d9cf942d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20260401024825-9d38bb4040a9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20260319004828-5883c5ee87b9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer_test.go:func FuzzLoadDefaultProfile(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzz_test.go:func FuzzApply(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzz_test.go:func FuzzImportIndex(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzz_test.go:func FuzzContainerdImport(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzz_test.go:func FuzzCSWalk(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzz_test.go:func FuzzArchiveExport(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzz_test.go:func FuzzCRIServer(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzz_test.go:func FuzzDiffApply(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzz_test.go:func FuzzDiffCompare(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzz_test.go:func FuzzExchange(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/images_fuzz_test.go:func FuzzImagesCheck(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzImageStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzLeaseManager(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzContainerStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzContentStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_test.go:func FuzzParseHostsFile(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz_test.go:func FuzzConvertManifest(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz_test.go:func FuzzFetcher(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegNoTearDownWithDownload(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerNoTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerWithTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ internal/cri/server/images/image_fuzz_test.go:func FuzzParseAuth(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=internal/cri/server/images Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/internal/cri/server/images FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer_test.go:func FuzzDecompressStream(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzz_test.go:func FuzzContentStoreWriter(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 52404, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/300) remote: Counting objects: 1% (3/300) remote: Counting objects: 2% (6/300) remote: Counting objects: 3% (9/300) remote: Counting objects: 4% (12/300) remote: Counting objects: 5% (15/300) remote: Counting objects: 6% (18/300) remote: Counting objects: 7% (21/300) remote: Counting objects: 8% (24/300) remote: Counting objects: 9% (27/300) remote: Counting objects: 10% (30/300) remote: Counting objects: 11% (33/300) remote: Counting objects: 12% (36/300) remote: Counting objects: 13% (39/300) remote: Counting objects: 14% (42/300) remote: Counting objects: 15% (45/300) remote: Counting objects: 16% (48/300) remote: Counting objects: 17% (51/300) remote: Counting objects: 18% (54/300) remote: Counting objects: 19% (57/300) remote: Counting objects: 20% (60/300) remote: Counting objects: 21% (63/300) remote: Counting objects: 22% (66/300) remote: Counting objects: 23% (69/300) remote: Counting objects: 24% (72/300) remote: Counting objects: 25% (75/300) remote: Counting objects: 26% (78/300) remote: Counting objects: 27% (81/300) remote: Counting objects: 28% (84/300) remote: Counting objects: 29% (87/300) remote: Counting objects: 30% (90/300) remote: Counting objects: 31% (93/300) remote: Counting objects: 32% (96/300) remote: Counting objects: 33% (99/300) remote: Counting objects: 34% (102/300) remote: Counting objects: 35% (105/300) remote: Counting objects: 36% (108/300) remote: Counting objects: 37% (111/300) remote: Counting objects: 38% (114/300) remote: Counting objects: 39% (117/300) remote: Counting objects: 40% (120/300) remote: Counting objects: 41% (123/300) remote: Counting objects: 42% (126/300) remote: Counting objects: 43% (129/300) remote: Counting objects: 44% (132/300) remote: Counting objects: 45% (135/300) remote: Counting objects: 46% (138/300) remote: Counting objects: 47% (141/300) remote: Counting objects: 48% (144/300) remote: Counting objects: 49% (147/300) remote: Counting objects: 50% (150/300) remote: Counting objects: 51% (153/300) remote: Counting objects: 52% (156/300) remote: Counting objects: 53% (159/300) remote: Counting objects: 54% (162/300) remote: Counting objects: 55% (165/300) remote: Counting objects: 56% (168/300) remote: Counting objects: 57% (171/300) remote: Counting objects: 58% (174/300) remote: Counting objects: 59% (177/300) remote: Counting objects: 60% (180/300) remote: Counting objects: 61% (183/300) remote: Counting objects: 62% (186/300) remote: Counting objects: 63% (189/300) remote: Counting objects: 64% (192/300) remote: Counting objects: 65% (195/300) remote: Counting objects: 66% (198/300) remote: Counting objects: 67% (201/300) remote: Counting objects: 68% (204/300) remote: Counting objects: 69% (207/300) remote: Counting objects: 70% (210/300) remote: Counting objects: 71% (213/300) remote: Counting objects: 72% (216/300) remote: Counting objects: 73% (219/300) remote: Counting objects: 74% (222/300) remote: Counting objects: 75% (225/300) remote: Counting objects: 76% (228/300) remote: Counting objects: 77% (231/300) remote: Counting objects: 78% (234/300) remote: Counting objects: 79% (237/300) remote: Counting objects: 80% (240/300) remote: Counting objects: 81% (243/300) remote: Counting objects: 82% (246/300) remote: Counting objects: 83% (249/300) remote: Counting objects: 84% (252/300) remote: Counting objects: 85% (255/300) remote: Counting objects: 86% (258/300) remote: Counting objects: 87% (261/300) remote: Counting objects: 88% (264/300) remote: Counting objects: 89% (267/300) remote: Counting objects: 90% (270/300) remote: Counting objects: 91% (273/300) remote: Counting objects: 92% (276/300) remote: Counting objects: 93% (279/300) remote: Counting objects: 94% (282/300) remote: Counting objects: 95% (285/300) remote: Counting objects: 96% (288/300) remote: Counting objects: 97% (291/300) remote: Counting objects: 98% (294/300) remote: Counting objects: 99% (297/300) remote: Counting objects: 100% (300/300) remote: Counting objects: 100% (300/300), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 0% (1/136) remote: Compressing objects: 1% (2/136) remote: Compressing objects: 2% (3/136) remote: Compressing objects: 3% (5/136) remote: Compressing objects: 4% (6/136) remote: Compressing objects: 5% (7/136) remote: Compressing objects: 6% (9/136) remote: Compressing objects: 7% (10/136) remote: Compressing objects: 8% (11/136) remote: Compressing objects: 9% (13/136) remote: Compressing objects: 10% (14/136) remote: Compressing objects: 11% (15/136) remote: Compressing objects: 12% (17/136) remote: Compressing objects: 13% (18/136) remote: Compressing objects: 14% (20/136) remote: Compressing objects: 15% (21/136) remote: Compressing objects: 16% (22/136) remote: Compressing objects: 17% (24/136) remote: Compressing objects: 18% (25/136) remote: Compressing objects: 19% (26/136) remote: Compressing objects: 20% (28/136) remote: Compressing objects: 21% (29/136) remote: Compressing objects: 22% (30/136) remote: Compressing objects: 23% (32/136) remote: Compressing objects: 24% (33/136) remote: Compressing objects: 25% (34/136) remote: Compressing objects: 26% (36/136) remote: Compressing objects: 27% (37/136) remote: Compressing objects: 28% (39/136) remote: Compressing objects: 29% (40/136) remote: Compressing objects: 30% (41/136) remote: Compressing objects: 31% (43/136) remote: Compressing objects: 32% (44/136) remote: Compressing objects: 33% (45/136) remote: Compressing objects: 34% (47/136) remote: Compressing objects: 35% (48/136) remote: Compressing objects: 36% (49/136) remote: Compressing objects: 37% (51/136) remote: Compressing objects: 38% (52/136) remote: Compressing objects: 39% (54/136) remote: Compressing objects: 40% (55/136) remote: Compressing objects: 41% (56/136) remote: Compressing objects: 42% (58/136) remote: Compressing objects: 43% (59/136) remote: Compressing objects: 44% (60/136) remote: Compressing objects: 45% (62/136) remote: Compressing objects: 46% (63/136) remote: Compressing objects: 47% (64/136) remote: Compressing objects: 48% (66/136) remote: Compressing objects: 49% (67/136) remote: Compressing objects: 50% (68/136) remote: Compressing objects: 51% (70/136) remote: Compressing objects: 52% (71/136) remote: Compressing objects: 53% (73/136) remote: Compressing objects: 54% (74/136) remote: Compressing objects: 55% (75/136) remote: Compressing objects: 56% (77/136) remote: Compressing objects: 57% (78/136) remote: Compressing objects: 58% (79/136) remote: Compressing objects: 59% (81/136) remote: Compressing objects: 60% (82/136) remote: Compressing objects: 61% (83/136) remote: Compressing objects: 62% (85/136) remote: Compressing objects: 63% (86/136) remote: Compressing objects: 64% (88/136) remote: Compressing objects: 65% (89/136) remote: Compressing objects: 66% (90/136) remote: Compressing objects: 67% (92/136) remote: Compressing objects: 68% (93/136) remote: Compressing objects: 69% (94/136) remote: Compressing objects: 70% (96/136) remote: Compressing objects: 71% (97/136) remote: Compressing objects: 72% (98/136) remote: Compressing objects: 73% (100/136) remote: Compressing objects: 74% (101/136) remote: Compressing objects: 75% (102/136) remote: Compressing objects: 76% (104/136) remote: Compressing objects: 77% (105/136) remote: Compressing objects: 78% (107/136) remote: Compressing objects: 79% (108/136) remote: Compressing objects: 80% (109/136) remote: Compressing objects: 81% (111/136) remote: Compressing objects: 82% (112/136) remote: Compressing objects: 83% (113/136) remote: Compressing objects: 84% (115/136) remote: Compressing objects: 85% (116/136) remote: Compressing objects: 86% (117/136) remote: Compressing objects: 87% (119/136) remote: Compressing objects: 88% (120/136) remote: Compressing objects: 89% (122/136) remote: Compressing objects: 90% (123/136) remote: Compressing objects: 91% (124/136) remote: Compressing objects: 92% (126/136) remote: Compressing objects: 93% (127/136) remote: Compressing objects: 94% (128/136) remote: Compressing objects: 95% (130/136) remote: Compressing objects: 96% (131/136) remote: Compressing objects: 97% (132/136) remote: Compressing objects: 98% (134/136) remote: Compressing objects: 99% (135/136) remote: Compressing objects: 100% (136/136) remote: Compressing objects: 100% (136/136), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/52404) Receiving objects: 1% (525/52404) Receiving objects: 2% (1049/52404) Receiving objects: 3% (1573/52404) Receiving objects: 4% (2097/52404) Receiving objects: 5% (2621/52404) Receiving objects: 6% (3145/52404) Receiving objects: 7% (3669/52404) Receiving objects: 8% (4193/52404) Receiving objects: 9% (4717/52404) Receiving objects: 10% (5241/52404) Receiving objects: 11% (5765/52404) Receiving objects: 12% (6289/52404) Receiving objects: 13% (6813/52404) Receiving objects: 14% (7337/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 15% (7861/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 16% (8385/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 17% (8909/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 18% (9433/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 19% (9957/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 20% (10481/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 21% (11005/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 22% (11529/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 23% (12053/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 24% (12577/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 25% (13101/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 26% (13626/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 27% (14150/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 28% (14674/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 29% (15198/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 30% (15722/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 31% (16246/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 32% (16770/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 33% (17294/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 34% (17818/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 35% (18342/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 36% (18866/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 37% (19390/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 38% (19914/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 38% (20100/52404), 3.48 MiB | 6.95 MiB/s Receiving objects: 39% (20438/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 40% (20962/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 41% (21486/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 42% (22010/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 43% (22534/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 44% (23058/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 45% (23582/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 46% (24106/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 47% (24630/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 48% (25154/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 49% (25678/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 50% (26202/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 51% (26727/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 52% (27251/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 53% (27775/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 54% (28299/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 55% (28823/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 56% (29347/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 57% (29871/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 58% (30395/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 59% (30919/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 60% (31443/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 61% (31967/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 62% (32491/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 63% (33015/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 64% (33539/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 65% (34063/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 66% (34587/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 67% (35111/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 68% (35635/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 69% (36159/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 70% (36683/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 71% (37207/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 72% (37731/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 73% (38255/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 74% (38779/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 75% (39303/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 76% (39828/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 77% (40352/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 78% (40876/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 79% (41400/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 80% (41924/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 81% (42448/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 82% (42972/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 83% (43496/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 84% (44020/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 85% (44544/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 86% (45068/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 87% (45592/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 88% (46116/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 89% (46640/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 90% (47164/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 91% (47688/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 92% (48212/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 93% (48736/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 94% (49260/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 95% (49784/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 96% (50308/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 97% (50832/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 98% (51356/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 99% (51880/52404), 12.98 MiB | 12.97 MiB/s remote: Total 52404 (delta 224), reused 164 (delta 164), pack-reused 52104 (from 3) Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (52404/52404), 12.98 MiB | 12.97 MiB/s Receiving objects: 100% (52404/52404), 25.59 MiB | 18.08 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/34085) Resolving deltas: 1% (342/34085) Resolving deltas: 2% (682/34085) Resolving deltas: 3% (1024/34085) Resolving deltas: 4% (1364/34085) Resolving deltas: 5% (1705/34085) Resolving deltas: 6% (2046/34085) Resolving deltas: 7% (2386/34085) Resolving deltas: 8% (2730/34085) Resolving deltas: 9% (3068/34085) Resolving deltas: 10% (3409/34085) Resolving deltas: 11% (3750/34085) Resolving deltas: 12% (4091/34085) Resolving deltas: 13% (4435/34085) Resolving deltas: 14% (4773/34085) Resolving deltas: 15% (5114/34085) Resolving deltas: 16% (5454/34085) Resolving deltas: 17% (5797/34085) Resolving deltas: 18% (6137/34085) Resolving deltas: 19% (6478/34085) Resolving deltas: 20% (6817/34085) Resolving deltas: 21% (7158/34085) Resolving deltas: 22% (7499/34085) Resolving deltas: 23% (7840/34085) Resolving deltas: 24% (8184/34085) Resolving deltas: 25% (8522/34085) Resolving deltas: 26% (8863/34085) Resolving deltas: 27% (9204/34085) Resolving deltas: 28% (9544/34085) Resolving deltas: 29% (9887/34085) Resolving deltas: 30% (10226/34085) Resolving deltas: 31% (10567/34085) Resolving deltas: 32% (10910/34085) Resolving deltas: 33% (11249/34085) Resolving deltas: 34% (11594/34085) Resolving deltas: 35% (11930/34085) Resolving deltas: 36% (12271/34085) Resolving deltas: 37% (12612/34085) Resolving deltas: 38% (12953/34085) Resolving deltas: 39% (13294/34085) Resolving deltas: 40% (13634/34085) Resolving deltas: 41% (13975/34085) Resolving deltas: 42% (14319/34085) Resolving deltas: 43% (14657/34085) Resolving deltas: 44% (14998/34085) Resolving deltas: 45% (15339/34085) Resolving deltas: 46% (15681/34085) Resolving deltas: 47% (16020/34085) Resolving deltas: 48% (16362/34085) Resolving deltas: 49% (16704/34085) Resolving deltas: 50% (17043/34085) Resolving deltas: 51% (17384/34085) Resolving deltas: 52% (17725/34085) Resolving deltas: 53% (18066/34085) Resolving deltas: 54% (18406/34085) Resolving deltas: 55% (18747/34085) Resolving deltas: 56% (19088/34085) Resolving deltas: 57% (19429/34085) Resolving deltas: 58% (19770/34085) Resolving deltas: 59% (20111/34085) Resolving deltas: 60% (20451/34085) Resolving deltas: 61% (20792/34085) Resolving deltas: 62% (21133/34085) Resolving deltas: 63% (21474/34085) Resolving deltas: 64% (21815/34085) Resolving deltas: 65% (22156/34085) Resolving deltas: 66% (22497/34085) Resolving deltas: 67% (22838/34085) Resolving deltas: 68% (23178/34085) Resolving deltas: 69% (23520/34085) Resolving deltas: 70% (23861/34085) Resolving deltas: 71% (24201/34085) Resolving deltas: 72% (24542/34085) Resolving deltas: 73% (24883/34085) Resolving deltas: 74% (25223/34085) Resolving deltas: 75% (25564/34085) Resolving deltas: 76% (25905/34085) Resolving deltas: 77% (26246/34085) Resolving deltas: 78% (26587/34085) Resolving deltas: 79% (26928/34085) Resolving deltas: 80% (27268/34085) Resolving deltas: 81% (27609/34085) Resolving deltas: 82% (27950/34085) Resolving deltas: 83% (28291/34085) Resolving deltas: 84% (28632/34085) Resolving deltas: 85% (28973/34085) Resolving deltas: 86% (29314/34085) Resolving deltas: 87% (29654/34085) Resolving deltas: 88% (29995/34085) Resolving deltas: 89% (30336/34085) Resolving deltas: 90% (30677/34085) Resolving deltas: 91% (31019/34085) Resolving deltas: 92% (31359/34085) Resolving deltas: 93% (31700/34085) Resolving deltas: 94% (32040/34085) Resolving deltas: 95% (32381/34085) Resolving deltas: 96% (32723/34085) Resolving deltas: 97% (33064/34085) Resolving deltas: 98% (33404/34085) Resolving deltas: 99% (33745/34085) Resolving deltas: 100% (34085/34085) Resolving deltas: 100% (34085/34085), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.15-2-g06833792 -X main.version=1.1.15+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.79.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20251202230838-ff82c1b0f217 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.39.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.48.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.32.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=6085e86.m -X github.com/containerd/containerd/v2/version.Revision=6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=6085e86.m -X github.com/containerd/containerd/v2/version.Revision=6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/containerd/containerd/v2/cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/ld: /tmp/go-link-494507004/000021.o: in function `New': Step #3 - "compile-libfuzzer-coverage-x86_64": /tmp/go-build/pkcs11.cgo2.c:77:(.text+0x22): warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=6085e86.m -X github.com/containerd/containerd/v2/version.Revision=6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": CGO_ENABLED=0 go build -o bin/containerd-shim-runc-v2 -ldflags '-X github.com/containerd/containerd/v2/version.Version=6085e86.m -X github.com/containerd/containerd/v2/version.Revision=6085e86b5ee54c9b9ba5d5f675caf26c4c9e3f81.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -extldflags "-static" -s -w' -tags "urfave_cli_no_docs osusergo netgo static_build no_grpc" ./cmd/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegNoTearDownWithDownload(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerNoTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerWithTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Pulling fs layer Step #4: 1509107ff940: Pulling fs layer Step #4: 5a14ec5c6fa0: Pulling fs layer Step #4: 6fb497338def: Pulling fs layer Step #4: 7d459eb87118: Pulling fs layer Step #4: eb0ff74b6d5d: Pulling fs layer Step #4: 7e76a26e6907: Pulling fs layer Step #4: b47a5064fcbf: Pulling fs layer Step #4: fda1419fb46f: Pulling fs layer Step #4: 3e52a945d9c4: Pulling fs layer Step #4: 821a2aec2656: Pulling fs layer Step #4: f57cf13e7149: Pulling fs layer Step #4: 02c1a4269064: Pulling fs layer Step #4: d0224c3fdf20: Pulling fs layer Step #4: 369dbbe540b4: Pulling fs layer Step #4: 18e677a937b6: Pulling fs layer Step #4: 80a6e337c8da: Pulling fs layer Step #4: 5921cf6b7929: Pulling fs layer Step #4: d590bdf5c22f: Pulling fs layer Step #4: b96f55232348: Pulling fs layer Step #4: 0d8f6df67750: Pulling fs layer Step #4: d9eb937f4f1e: Pulling fs layer Step #4: a82f9e57bc4b: Pulling fs layer Step #4: 4db8f9798444: Pulling fs layer Step #4: 48aa2356b324: Pulling fs layer Step #4: f50c8d860ec3: Pulling fs layer Step #4: 7d856f8b8fba: Pulling fs layer Step #4: 03165fde3e5c: Pulling fs layer Step #4: 02c1a4269064: Waiting Step #4: d0224c3fdf20: Waiting Step #4: 369dbbe540b4: Waiting Step #4: 18e677a937b6: Waiting Step #4: 80a6e337c8da: Waiting Step #4: 5921cf6b7929: Waiting Step #4: d590bdf5c22f: Waiting Step #4: b96f55232348: Waiting Step #4: 3e52a945d9c4: Waiting Step #4: 0d8f6df67750: Waiting Step #4: 7e76a26e6907: Waiting Step #4: d9eb937f4f1e: Waiting Step #4: b47a5064fcbf: Waiting Step #4: a82f9e57bc4b: Waiting Step #4: fda1419fb46f: Waiting Step #4: 821a2aec2656: Waiting Step #4: 4db8f9798444: Waiting Step #4: 48aa2356b324: Waiting Step #4: f57cf13e7149: Waiting Step #4: 7d856f8b8fba: Waiting Step #4: f50c8d860ec3: Waiting Step #4: eb0ff74b6d5d: Verifying Checksum Step #4: eb0ff74b6d5d: Download complete Step #4: 5a14ec5c6fa0: Verifying Checksum Step #4: 5a14ec5c6fa0: Download complete Step #4: 6fb497338def: Verifying Checksum Step #4: 6fb497338def: Download complete Step #4: 7d459eb87118: Verifying Checksum Step #4: 7d459eb87118: Download complete Step #4: b47a5064fcbf: Verifying Checksum Step #4: b47a5064fcbf: Download complete Step #4: 7e76a26e6907: Verifying Checksum Step #4: 7e76a26e6907: Download complete Step #4: 3e52a945d9c4: Verifying Checksum Step #4: 3e52a945d9c4: Download complete Step #4: b549f31133a9: Verifying Checksum Step #4: b549f31133a9: Download complete Step #4: 821a2aec2656: Verifying Checksum Step #4: 821a2aec2656: Download complete Step #4: f57cf13e7149: Verifying Checksum Step #4: f57cf13e7149: Download complete Step #4: 369dbbe540b4: Verifying Checksum Step #4: 369dbbe540b4: Download complete Step #4: d0224c3fdf20: Verifying Checksum Step #4: d0224c3fdf20: Download complete Step #4: 18e677a937b6: Verifying Checksum Step #4: 18e677a937b6: Download complete Step #4: fda1419fb46f: Verifying Checksum Step #4: fda1419fb46f: Download complete Step #4: 5921cf6b7929: Verifying Checksum Step #4: 5921cf6b7929: Download complete Step #4: b96f55232348: Verifying Checksum Step #4: b96f55232348: Download complete Step #4: 1509107ff940: Verifying Checksum Step #4: 1509107ff940: Download complete Step #4: 0d8f6df67750: Verifying Checksum Step #4: 0d8f6df67750: Download complete Step #4: 02c1a4269064: Download complete Step #4: 4db8f9798444: Download complete Step #4: a82f9e57bc4b: Download complete Step #4: f50c8d860ec3: Verifying Checksum Step #4: f50c8d860ec3: Download complete Step #4: 03165fde3e5c: Verifying Checksum Step #4: 03165fde3e5c: Download complete Step #4: 48aa2356b324: Verifying Checksum Step #4: 48aa2356b324: Download complete Step #4: b549f31133a9: Pull complete Step #4: d9eb937f4f1e: Verifying Checksum Step #4: d9eb937f4f1e: Download complete Step #4: 80a6e337c8da: Verifying Checksum Step #4: 80a6e337c8da: Download complete Step #4: 7d856f8b8fba: Verifying Checksum Step #4: 7d856f8b8fba: Download complete Step #4: d590bdf5c22f: Verifying Checksum Step #4: d590bdf5c22f: Download complete Step #4: 1509107ff940: Pull complete Step #4: 5a14ec5c6fa0: Pull complete Step #4: 6fb497338def: Pull complete Step #4: 7d459eb87118: Pull complete Step #4: eb0ff74b6d5d: Pull complete Step #4: 7e76a26e6907: Pull complete Step #4: b47a5064fcbf: Pull complete Step #4: fda1419fb46f: Pull complete Step #4: 3e52a945d9c4: Pull complete Step #4: 821a2aec2656: Pull complete Step #4: f57cf13e7149: Pull complete Step #4: 02c1a4269064: Pull complete Step #4: d0224c3fdf20: Pull complete Step #4: 369dbbe540b4: Pull complete Step #4: 18e677a937b6: Pull complete Step #4: 80a6e337c8da: Pull complete Step #4: 5921cf6b7929: Pull complete Step #4: d590bdf5c22f: Pull complete Step #4: b96f55232348: Pull complete Step #4: 0d8f6df67750: Pull complete Step #4: d9eb937f4f1e: Pull complete Step #4: a82f9e57bc4b: Pull complete Step #4: 4db8f9798444: Pull complete Step #4: 48aa2356b324: Pull complete Step #4: f50c8d860ec3: Pull complete Step #4: 7d856f8b8fba: Pull complete Step #4: 03165fde3e5c: Pull complete Step #4: Digest: sha256:22a7d506a005742834d5e45d83e477f629c82253d4f038c8d5dbcd7a32057c08 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Pulling image: gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: ubuntu-24-04: Pulling from oss-fuzz-base/base-runner Step #5: 76249c7cd503: Already exists Step #5: 6c4381f00051: Already exists Step #5: a7deedbbc981: Already exists Step #5: 06709db40651: Pulling fs layer Step #5: 5ee7e14bfe29: Pulling fs layer Step #5: 846ac932a8ae: Pulling fs layer Step #5: 0df6b9ca635a: Pulling fs layer Step #5: 9cb265703bc4: Pulling fs layer Step #5: e81099c8ada9: Pulling fs layer Step #5: 387f6addea35: Pulling fs layer Step #5: 1139172ec494: Pulling fs layer Step #5: 5b9b78779398: Pulling fs layer Step #5: e8a993d5e033: Pulling fs layer Step #5: 68f7273d3adb: Pulling fs layer Step #5: 79a8a5001d9e: Pulling fs layer Step #5: 18e677a937b6: Pulling fs layer Step #5: af429bd494a0: Pulling fs layer Step #5: 5921cf6b7929: Pulling fs layer Step #5: be044b23f74f: Pulling fs layer Step #5: b2e13a8d5df3: Pulling fs layer Step #5: 0d8f6df67750: Pulling fs layer Step #5: 018437369ef4: Pulling fs layer Step #5: 3a27b59b9f44: Pulling fs layer Step #5: f4c32b8dd8b4: Pulling fs layer Step #5: f40942a596bc: Pulling fs layer Step #5: 13a5d6a37b67: Pulling fs layer Step #5: 92feadb9efa4: Pulling fs layer Step #5: a3670851c604: Pulling fs layer Step #5: be044b23f74f: Waiting Step #5: e8a993d5e033: Waiting Step #5: 18e677a937b6: Waiting Step #5: 68f7273d3adb: Waiting Step #5: 387f6addea35: Waiting Step #5: af429bd494a0: Waiting Step #5: 79a8a5001d9e: Waiting Step #5: 5921cf6b7929: Waiting Step #5: 1139172ec494: Waiting Step #5: b2e13a8d5df3: Waiting Step #5: 018437369ef4: Waiting Step #5: 5b9b78779398: Waiting Step #5: 0d8f6df67750: Waiting Step #5: f40942a596bc: Waiting Step #5: 3a27b59b9f44: Waiting Step #5: f4c32b8dd8b4: Waiting Step #5: 13a5d6a37b67: Waiting Step #5: 92feadb9efa4: Waiting Step #5: a3670851c604: Waiting Step #5: 846ac932a8ae: Download complete Step #5: 9cb265703bc4: Verifying Checksum Step #5: 9cb265703bc4: Download complete Step #5: 06709db40651: Verifying Checksum Step #5: 06709db40651: Download complete Step #5: 0df6b9ca635a: Verifying Checksum Step #5: 0df6b9ca635a: Download complete Step #5: 5ee7e14bfe29: Verifying Checksum Step #5: 5ee7e14bfe29: Download complete Step #5: 387f6addea35: Verifying Checksum Step #5: 387f6addea35: Download complete Step #5: 1139172ec494: Verifying Checksum Step #5: 1139172ec494: Download complete Step #5: 06709db40651: Pull complete Step #5: 5b9b78779398: Verifying Checksum Step #5: 5b9b78779398: Download complete Step #5: 18e677a937b6: Verifying Checksum Step #5: 18e677a937b6: Download complete Step #5: 79a8a5001d9e: Download complete Step #5: 68f7273d3adb: Verifying Checksum Step #5: 68f7273d3adb: Download complete Step #5: 5ee7e14bfe29: Pull complete Step #5: e81099c8ada9: Verifying Checksum Step #5: e81099c8ada9: Download complete Step #5: 5921cf6b7929: Verifying Checksum Step #5: 5921cf6b7929: Download complete Step #5: 846ac932a8ae: Pull complete Step #5: b2e13a8d5df3: Verifying Checksum Step #5: b2e13a8d5df3: Download complete Step #5: 0d8f6df67750: Verifying Checksum Step #5: 0d8f6df67750: Download complete Step #5: e8a993d5e033: Verifying Checksum Step #5: e8a993d5e033: Download complete Step #5: 0df6b9ca635a: Pull complete Step #5: f4c32b8dd8b4: Download complete Step #5: 3a27b59b9f44: Verifying Checksum Step #5: 3a27b59b9f44: Download complete Step #5: 9cb265703bc4: Pull complete Step #5: f40942a596bc: Verifying Checksum Step #5: f40942a596bc: Download complete Step #5: 13a5d6a37b67: Verifying Checksum Step #5: 13a5d6a37b67: Download complete Step #5: a3670851c604: Verifying Checksum Step #5: a3670851c604: Download complete Step #5: af429bd494a0: Verifying Checksum Step #5: af429bd494a0: Download complete Step #5: 92feadb9efa4: Verifying Checksum Step #5: 92feadb9efa4: Download complete Step #5: 018437369ef4: Verifying Checksum Step #5: be044b23f74f: Verifying Checksum Step #5: be044b23f74f: Download complete Step #5: e81099c8ada9: Pull complete Step #5: 387f6addea35: Pull complete Step #5: 1139172ec494: Pull complete Step #5: 5b9b78779398: Pull complete Step #5: e8a993d5e033: Pull complete Step #5: 68f7273d3adb: Pull complete Step #5: 79a8a5001d9e: Pull complete Step #5: 18e677a937b6: Pull complete Step #5: af429bd494a0: Pull complete Step #5: 5921cf6b7929: Pull complete Step #5: be044b23f74f: Pull complete Step #5: b2e13a8d5df3: Pull complete Step #5: 0d8f6df67750: Pull complete Step #5: 018437369ef4: Pull complete Step #5: 3a27b59b9f44: Pull complete Step #5: f4c32b8dd8b4: Pull complete Step #5: f40942a596bc: Pull complete Step #5: 13a5d6a37b67: Pull complete Step #5: 92feadb9efa4: Pull complete Step #5: a3670851c604: Pull complete Step #5: Digest: sha256:c1257bda749eb891d5dac719ebe0d5479fb8b5aa320b8ee69979bb03e04b8c6c Step #5: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: gcr.io/oss-fuzz-base/base-runner:ubuntu-24-04 Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: Running go target fuzz_FuzzCSWalk Step #5: Running go target fuzz_FuzzExchange Step #5: Running go target fuzz_FuzzContentStore Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: Running go target fuzz_FuzzArchiveExport Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: 2026/05/17 06:45:52 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: Running go target fuzz_FuzzConvertManifest Step #5: Running go target fuzz_FuzzParseAuth Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: Running go target fuzz_FuzzFiltersParse Step #5: Running go target fuzz_FuzzFetcher Step #5: Running go target fuzz_FuzzLeaseManager Step #5: Running go target fuzz_FuzzApply Step #5: Running go target fuzz_FuzzDiffCompare Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: Running go target fuzz_FuzzDiffApply Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2026/05/17 06:45:53 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: Running go target fuzz_FuzzImportIndex Step #5: Running go target fuzz_FuzzImageStore Step #5: Running go target fuzz_FuzzCRIServer Step #5: Running go target fuzz_FuzzImagesCheck Step #5: Running go target fuzz_FuzzContainerStore Step #5: Running go target fuzz_FuzzDecompressStream Step #5: Running go target fuzz_FuzzContainerdImport Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2026/05/17 06:45:53 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2026/05/17 06:45:53 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2026/05/17 06:45:53 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Pulling image: gcr.io/cloud-builders/gsutil Step #6: Using default tag: latest Step #6: latest: Pulling from cloud-builders/gsutil Step #6: 42041b00303d: Already exists Step #6: 4a8b006d9959: Already exists Step #6: 3c5783728edf: Already exists Step #6: 2b77bfb858b6: Already exists Step #6: f87d9838f4b4: Already exists Step #6: 2d90d4257af5: Already exists Step #6: fb54e0aea1ac: Pulling fs layer Step #6: ac5fbd7950ce: Pulling fs layer Step #6: ac5fbd7950ce: Download complete Step #6: fb54e0aea1ac: Verifying Checksum Step #6: fb54e0aea1ac: Download complete Step #6: fb54e0aea1ac: Pull complete Step #6: ac5fbd7950ce: Pull complete Step #6: Digest: sha256:818069dbc19fbdc2baa91a527c55c08e05f9c92734b6a52dc66f02803d2f20a6 Step #6: Status: Downloaded newer image for gcr.io/cloud-builders/gsutil:latest Step #6: gcr.io/cloud-builders/gsutil:latest Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/990.7 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][ 0.0 B/990.7 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/990.7 KiB] 0% Done / [1/3 files][990.7 KiB/990.7 KiB] 99% Done / [2/3 files][990.7 KiB/990.7 KiB] 99% Done / [3/3 files][990.7 KiB/990.7 KiB] 100% Done Step #7: Operation completed over 3 objects/990.7 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 41.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 41.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 41.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 41.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 41.9 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.5 KiB/ 41.9 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.5 KiB/ 41.9 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.5 KiB/ 41.9 KiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.3 KiB/ 41.9 KiB] 7% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.3 KiB/ 41.9 KiB] 7% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [0/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [0/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done / [0/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done / [1/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [1/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: / [1/29 files][ 6.2 KiB/ 41.9 KiB] 14% Done / [2/29 files][ 7.1 KiB/ 41.9 KiB] 16% Done / [3/29 files][ 7.1 KiB/ 41.9 KiB] 16% Done / [4/29 files][ 7.1 KiB/ 41.9 KiB] 16% Done / [5/29 files][ 7.1 KiB/ 41.9 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [5/29 files][ 7.1 KiB/ 41.9 KiB] 16% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: / [5/29 files][ 15.1 KiB/ 41.9 KiB] 36% Done / [5/29 files][ 15.1 KiB/ 41.9 KiB] 36% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: / [5/29 files][ 18.9 KiB/ 41.9 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [5/29 files][ 18.9 KiB/ 41.9 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: / [5/29 files][ 18.9 KiB/ 41.9 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: / [5/29 files][ 18.9 KiB/ 41.9 KiB] 45% Done / [6/29 files][ 18.9 KiB/ 41.9 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [6/29 files][ 19.7 KiB/ 41.9 KiB] 47% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: / [6/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [6/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done / [7/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [8/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done / [8/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [8/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: / [8/29 files][ 22.1 KiB/ 41.9 KiB] 52% Done / [9/29 files][ 22.9 KiB/ 41.9 KiB] 54% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [9/29 files][ 22.9 KiB/ 41.9 KiB] 54% Done / [10/29 files][ 22.9 KiB/ 41.9 KiB] 54% Done / [11/29 files][ 22.9 KiB/ 41.9 KiB] 54% Done / [12/29 files][ 26.2 KiB/ 41.9 KiB] 62% Done / [13/29 files][ 26.2 KiB/ 41.9 KiB] 62% Done / [14/29 files][ 26.2 KiB/ 41.9 KiB] 62% Done / [15/29 files][ 26.2 KiB/ 41.9 KiB] 62% Done / [16/29 files][ 32.6 KiB/ 41.9 KiB] 77% Done / [17/29 files][ 34.1 KiB/ 41.9 KiB] 81% Done / [18/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done / [19/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done / [20/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - - [21/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [22/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [23/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [24/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [25/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [26/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [27/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [28/29 files][ 41.9 KiB/ 41.9 KiB] 99% Done - [29/29 files][ 41.9 KiB/ 41.9 KiB] 100% Done Step #9: Operation completed over 29 objects/41.9 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 3.8 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 68.0 B/ 3.8 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 340.0 B/ 3.8 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 408.0 B/ 3.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 408.0 B/ 3.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 408.0 B/ 3.8 KiB] 10% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 408.0 B/ 3.8 KiB] 10% Done / [1/28 files][ 408.0 B/ 3.8 KiB] 10% Done / [2/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [3/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [4/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [4/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [5/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [5/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [5/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: / [5/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [5/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [7/28 files][ 681.0 B/ 3.8 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [7/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [7/28 files][ 681.0 B/ 3.8 KiB] 17% Done / [8/28 files][ 749.0 B/ 3.8 KiB] 19% Done / [9/28 files][ 817.0 B/ 3.8 KiB] 21% Done / [10/28 files][ 1021 B/ 3.8 KiB] 26% Done / [11/28 files][ 3.3 KiB/ 3.8 KiB] 87% Done / [12/28 files][ 3.3 KiB/ 3.8 KiB] 87% Done / [13/28 files][ 3.3 KiB/ 3.8 KiB] 87% Done / [14/28 files][ 3.5 KiB/ 3.8 KiB] 92% Done / [15/28 files][ 3.5 KiB/ 3.8 KiB] 92% Done / [16/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done / [17/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done / [18/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done / [19/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done / [20/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - - [21/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [22/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [23/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [24/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [25/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [26/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [27/28 files][ 3.8 KiB/ 3.8 KiB] 99% Done - [28/28 files][ 3.8 KiB/ 3.8 KiB] 100% Done Step #11: Operation completed over 28 objects/3.8 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1465 --:--:-- --:--:-- --:--:-- 1479 Finished Step #13 PUSH DONE