starting build "6d9852ac-9795-493d-9a52-bb48c5543ff0" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go-codeintelligencetesting Step #1: latest: Pulling from oss-fuzz-base/base-builder-go-codeintelligencetesting Step #1: d7bfe07ed847: Pulling fs layer Step #1: 974bfa396cfe: Pulling fs layer Step #1: ca1c37065a21: Pulling fs layer Step #1: 11e435f008fb: Pulling fs layer Step #1: c780a6b890d0: Pulling fs layer Step #1: 9cdbe93e35f0: Pulling fs layer Step #1: 42627872663b: Pulling fs layer Step #1: 4f216c38d9fd: Pulling fs layer Step #1: 974494277e43: Pulling fs layer Step #1: 43c61a765478: Pulling fs layer Step #1: 1ae01f2a037f: Pulling fs layer Step #1: 25099045a01d: Pulling fs layer Step #1: ef47998aa507: Pulling fs layer Step #1: 4eaad2c192e5: Pulling fs layer Step #1: 0dbc87c9dae8: Pulling fs layer Step #1: 1e5f268d1873: Pulling fs layer Step #1: 7d0ceb4a91af: Pulling fs layer Step #1: ad383326a0b2: Pulling fs layer Step #1: 11e435f008fb: Waiting Step #1: 6c4c030a855a: Pulling fs layer Step #1: c780a6b890d0: Waiting Step #1: 8980487dc951: Pulling fs layer Step #1: 4263f0d7e019: Pulling fs layer Step #1: f166331e2438: Pulling fs layer Step #1: 6c29fe3ae644: Pulling fs layer Step #1: b00d3764bc9f: Pulling fs layer Step #1: 2df9189e2aeb: Pulling fs layer Step #1: 25099045a01d: Waiting Step #1: 43c61a765478: Waiting Step #1: 1ae01f2a037f: Waiting Step #1: 9cdbe93e35f0: Waiting Step #1: 42627872663b: Waiting Step #1: 4f216c38d9fd: Waiting Step #1: 974494277e43: Waiting Step #1: 8980487dc951: Waiting Step #1: 4263f0d7e019: Waiting Step #1: ef47998aa507: Waiting Step #1: b00d3764bc9f: Waiting Step #1: 2df9189e2aeb: Waiting Step #1: 0dbc87c9dae8: Waiting Step #1: 1e5f268d1873: Waiting Step #1: f166331e2438: Waiting Step #1: 6c29fe3ae644: Waiting Step #1: 7d0ceb4a91af: Waiting Step #1: 6c4c030a855a: Waiting Step #1: ad383326a0b2: Waiting Step #1: ca1c37065a21: Verifying Checksum Step #1: ca1c37065a21: Download complete Step #1: d7bfe07ed847: Verifying Checksum Step #1: d7bfe07ed847: Download complete Step #1: 11e435f008fb: Verifying Checksum Step #1: 11e435f008fb: Download complete Step #1: 9cdbe93e35f0: Verifying Checksum Step #1: 9cdbe93e35f0: Download complete Step #1: 974bfa396cfe: Verifying Checksum Step #1: 974bfa396cfe: Download complete Step #1: c780a6b890d0: Verifying Checksum Step #1: c780a6b890d0: Download complete Step #1: 4f216c38d9fd: Download complete Step #1: 43c61a765478: Verifying Checksum Step #1: 43c61a765478: Download complete Step #1: 1ae01f2a037f: Verifying Checksum Step #1: 1ae01f2a037f: Download complete Step #1: 25099045a01d: Verifying Checksum Step #1: 25099045a01d: Download complete Step #1: d7bfe07ed847: Pull complete Step #1: ef47998aa507: Verifying Checksum Step #1: ef47998aa507: Download complete Step #1: 4eaad2c192e5: Download complete Step #1: 0dbc87c9dae8: Verifying Checksum Step #1: 0dbc87c9dae8: Download complete Step #1: 1e5f268d1873: Verifying Checksum Step #1: 1e5f268d1873: Download complete Step #1: 7d0ceb4a91af: Verifying Checksum Step #1: 7d0ceb4a91af: Download complete Step #1: ad383326a0b2: Verifying Checksum Step #1: ad383326a0b2: Download complete Step #1: 6c4c030a855a: Verifying Checksum Step #1: 6c4c030a855a: Download complete Step #1: 8980487dc951: Verifying Checksum Step #1: 8980487dc951: Download complete Step #1: 4263f0d7e019: Verifying Checksum Step #1: 4263f0d7e019: Download complete Step #1: f166331e2438: Verifying Checksum Step #1: f166331e2438: Download complete Step #1: 974494277e43: Verifying Checksum Step #1: 974494277e43: Download complete Step #1: b00d3764bc9f: Verifying Checksum Step #1: b00d3764bc9f: Download complete Step #1: 42627872663b: Verifying Checksum Step #1: 42627872663b: Download complete Step #1: 974bfa396cfe: Pull complete Step #1: ca1c37065a21: Pull complete Step #1: 6c29fe3ae644: Verifying Checksum Step #1: 6c29fe3ae644: Download complete Step #1: 2df9189e2aeb: Verifying Checksum Step #1: 2df9189e2aeb: Download complete Step #1: 11e435f008fb: Pull complete Step #1: c780a6b890d0: Pull complete Step #1: 9cdbe93e35f0: Pull complete Step #1: 42627872663b: Pull complete Step #1: 4f216c38d9fd: Pull complete Step #1: 974494277e43: Pull complete Step #1: 43c61a765478: Pull complete Step #1: 1ae01f2a037f: Pull complete Step #1: 25099045a01d: Pull complete Step #1: ef47998aa507: Pull complete Step #1: 4eaad2c192e5: Pull complete Step #1: 0dbc87c9dae8: Pull complete Step #1: 1e5f268d1873: Pull complete Step #1: 7d0ceb4a91af: Pull complete Step #1: ad383326a0b2: Pull complete Step #1: 6c4c030a855a: Pull complete Step #1: 8980487dc951: Pull complete Step #1: 4263f0d7e019: Pull complete Step #1: f166331e2438: Pull complete Step #1: 6c29fe3ae644: Pull complete Step #1: b00d3764bc9f: Pull complete Step #1: 2df9189e2aeb: Pull complete Step #1: Digest: sha256:836744c26e7ce6ca54810a0ff6829ceb50a55f3d260c026bb6026f27e9b09684 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go-codeintelligencetesting:latest Step #1: ---> 9d1f1358889e Step #1: Step 2/5 : RUN git clone https://github.com/google/gvisor Step #1: ---> Running in 6adfe832eac3 Step #1: Cloning into 'gvisor'... Step #1: Removing intermediate container 6adfe832eac3 Step #1: ---> 23adc9574788 Step #1: Step 3/5 : COPY build.sh state_fuzzer.go $SRC/ Step #1: ---> a2506a8fdcbc Step #1: Step 4/5 : ENV GVISOR_ROOT $SRC/gvisor Step #1: ---> Running in 846b0ee9bb90 Step #1: Removing intermediate container 846b0ee9bb90 Step #1: ---> a1bdc4cf9b27 Step #1: Step 5/5 : WORKDIR $GVISOR_ROOT Step #1: ---> Running in d45ba3d376d8 Step #1: Removing intermediate container d45ba3d376d8 Step #1: ---> 4d8d3d494961 Step #1: Successfully built 4d8d3d494961 Step #1: Successfully tagged gcr.io/oss-fuzz/gvisor:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gvisor Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileofC6rP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gvisor/.git Step #2 - "srcmap": + GIT_DIR=/src/gvisor Step #2 - "srcmap": + cd /src/gvisor Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gvisor Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=f857f268eceb1cdee0b2bdfa218c969c84033fcd Step #2 - "srcmap": + jq_inplace /tmp/fileofC6rP '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "f857f268eceb1cdee0b2bdfa218c969c84033fcd" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileGQ06ja Step #2 - "srcmap": + cat /tmp/fileofC6rP Step #2 - "srcmap": + jq '."/src/gvisor" = { type: "git", url: "https://github.com/google/gvisor", rev: "f857f268eceb1cdee0b2bdfa218c969c84033fcd" }' Step #2 - "srcmap": + mv /tmp/fileGQ06ja /tmp/fileofC6rP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/aflplusplus/.git Step #2 - "srcmap": + GIT_DIR=/src/aflplusplus Step #2 - "srcmap": + cd /src/aflplusplus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c208dcf9c573e3d85990c7dea777646f7fa4961c Step #2 - "srcmap": + jq_inplace /tmp/fileofC6rP '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileMJMl7J Step #2 - "srcmap": + cat /tmp/fileofC6rP Step #2 - "srcmap": + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": + mv /tmp/fileMJMl7J /tmp/fileofC6rP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileofC6rP Step #2 - "srcmap": + rm /tmp/fileofC6rP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gvisor": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gvisor", Step #2 - "srcmap": "rev": "f857f268eceb1cdee0b2bdfa218c969c84033fcd" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/aflplusplus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2 - "srcmap": "rev": "c208dcf9c573e3d85990c7dea777646f7fa4961c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image: gcr.io/oss-fuzz/gvisor Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + git checkout go Step #3 - "compile-libfuzzer-address-x86_64": Switched to a new branch 'go' Step #3 - "compile-libfuzzer-address-x86_64": branch 'go' set up to track 'origin/go'. Step #3 - "compile-libfuzzer-address-x86_64": + mv /src/state_fuzzer.go /src/gvisor/ Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer gvisor.dev/gvisor FuzzStateLoad state_load_fuzz Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/gvisor.dev/gvisor: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.0.0-20191024005414-555d28b269f0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.0.0-20211019181941-9d821ace8654 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.27.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bazelbuild/rules_go v0.30.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/BurntSushi/toml v0.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/cgroups v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/console v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/containerd v1.4.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/fifo v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/typeurl v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.0.3-0.20211123151946-c2389c3cb60a Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sirupsen/logrus v1.8.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/go-runc v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/btree v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/subcommands v1.0.2-0.20190508160503-636abe8753b8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/bits-and-blooms/bitset v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff v1.1.1-0.20190506075156-2146c9339422 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/godbus/dbus/v5 v5.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.0.0-20210220032951-036812b2e83c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pty v1.1.4-0.20190131011033-7dc38fb350b1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gofrs/flock v0.8.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20180916011248-d98352740cb2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/vishvananda/netlink v1.0.1-0.20190930145447-2ec5bdc52b86 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mohae/deepcopy v0.0.0-20170308212314-bb9b5e7adda9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/tools v0.1.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mattbaird/jsonpatch v0.0.0-20171005235357-81af80346b1a Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.16.13 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.16.14-rc.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/client-go v0.16.13 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cilium/ebpf v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/vishvananda/netns v0.0.0-20211101163701-50045581ed74 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.5.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gofuzz v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.0.0-20211015210444-4f30a5c0130f Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.0-20200313102051-9f266ea9e77c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.42.0-dev.0.20211020220737-f00baa6c3c84 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gotest.tools v2.2.0+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/ttrpc v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Microsoft/hcsshim v0.8.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/continuity v0.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Microsoft/go-winio v0.5.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pretty v0.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v2 v2.2.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto v0.0.0-20210722135532-667f2b7c528f Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.0.0-20190522114515-bc1a522cf7b1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/text v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/frankban/quicktest v1.11.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/protobuf v1.5.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opencensus.io v0.23.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.3.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/googleapis/gnostic v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.0.0-20211005180243-6b3c2da341f1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20190801114015-581e00157fb1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/appengine v1.6.7 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package gvisor.dev/gvisor/pkg/buffer Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package gotest.tools/v3/assert/cmp Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package gotest.tools/v3/assert Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gotest.tools/v3 v3.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found gotest.tools/v3/assert in gotest.tools/v3 v3.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: found gotest.tools/v3/assert/cmp in gotest.tools/v3 v3.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: finding module for package gvisor.dev/gvisor/pkg/buffer Step #3 - "compile-libfuzzer-address-x86_64": gvisor.dev/gvisor imports Step #3 - "compile-libfuzzer-address-x86_64": gvisor.dev/gvisor/pkg/buffer: no matching versions for query "latest" Step #3 - "compile-libfuzzer-address-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-address-x86_64": gvisor.dev/gvisor Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzStateLoad -o state_load_fuzz.a gvisor.dev/gvisor Step #3 - "compile-libfuzzer-address-x86_64": state_fuzzer.go:21:2: no required module provides package gvisor.dev/gvisor/pkg/buffer; to add it: Step #3 - "compile-libfuzzer-address-x86_64": go get gvisor.dev/gvisor/pkg/buffer Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-address-x86_64": Failed to build. Step #3 - "compile-libfuzzer-address-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_image gvisor Step #3 - "compile-libfuzzer-address-x86_64": python infra/helper.py build_fuzzers --sanitizer address --engine libfuzzer --architecture x86_64 gvisor Step #3 - "compile-libfuzzer-address-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-address-x86_64" ERROR ERROR: build step 3 "gcr.io/oss-fuzz/gvisor" failed: step exited with non-zero status: 1