starting build "b8cd6bc2-2f31-480d-a433-1a4a0d029ef6" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 800687449569: Pulling fs layer Step #1: 67cc84ed39bf: Pulling fs layer Step #1: 33c4464df317: Pulling fs layer Step #1: 7a3d59ffed63: Pulling fs layer Step #1: bc24bccd8f7c: Pulling fs layer Step #1: 18d20619fb8d: Pulling fs layer Step #1: 0ec212d79142: Pulling fs layer Step #1: 0d731e844f5b: Pulling fs layer Step #1: 03e6d4298870: Pulling fs layer Step #1: 9cb6c9480ffe: Pulling fs layer Step #1: 636367483a85: Pulling fs layer Step #1: ab160a08f40f: Pulling fs layer Step #1: d56fb1501120: Pulling fs layer Step #1: 6e5ee80d4b76: Pulling fs layer Step #1: 069b70ca1828: Pulling fs layer Step #1: 082a5c4ba783: Pulling fs layer Step #1: aeb889ce9374: Pulling fs layer Step #1: b3c77a307741: Pulling fs layer Step #1: 19afa95abd0d: Pulling fs layer Step #1: 3331bfca5447: Pulling fs layer Step #1: ca89507fe8d3: Pulling fs layer Step #1: 093d0a8d4813: Pulling fs layer Step #1: 562130e5e1f0: Pulling fs layer Step #1: c78d65770fdc: Pulling fs layer Step #1: d8a48a39f3bb: Pulling fs layer Step #1: 33c4464df317: Waiting Step #1: 7a3d59ffed63: Waiting Step #1: d547270a8392: Pulling fs layer Step #1: 0ec212d79142: Waiting Step #1: cd72b15f7674: Pulling fs layer Step #1: fed123fa2f8a: Pulling fs layer Step #1: 0d731e844f5b: Waiting Step #1: 39a8609a58c5: Pulling fs layer Step #1: d942b3144a95: Pulling fs layer Step #1: 03e6d4298870: Waiting Step #1: 30e6af2af1c7: Pulling fs layer Step #1: a9e61f79d57c: Pulling fs layer Step #1: bc24bccd8f7c: Waiting Step #1: 3331bfca5447: Waiting Step #1: 9cb6c9480ffe: Waiting Step #1: 18d20619fb8d: Waiting Step #1: ca89507fe8d3: Waiting Step #1: 636367483a85: Waiting Step #1: b3c77a307741: Waiting Step #1: 093d0a8d4813: Waiting Step #1: ab160a08f40f: Waiting Step #1: 562130e5e1f0: Waiting Step #1: d56fb1501120: Waiting Step #1: 082a5c4ba783: Waiting Step #1: 19afa95abd0d: Waiting Step #1: c78d65770fdc: Waiting Step #1: 6e5ee80d4b76: Waiting Step #1: aeb889ce9374: Waiting Step #1: d8a48a39f3bb: Waiting Step #1: 069b70ca1828: Waiting Step #1: d547270a8392: Waiting Step #1: 30e6af2af1c7: Waiting Step #1: a9e61f79d57c: Waiting Step #1: fed123fa2f8a: Waiting Step #1: 39a8609a58c5: Waiting Step #1: d942b3144a95: Waiting Step #1: 67cc84ed39bf: Verifying Checksum Step #1: 67cc84ed39bf: Download complete Step #1: 33c4464df317: Verifying Checksum Step #1: 33c4464df317: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 7a3d59ffed63: Verifying Checksum Step #1: 7a3d59ffed63: Download complete Step #1: bc24bccd8f7c: Verifying Checksum Step #1: bc24bccd8f7c: Download complete Step #1: 0ec212d79142: Verifying Checksum Step #1: 0ec212d79142: Download complete Step #1: 0d731e844f5b: Verifying Checksum Step #1: 0d731e844f5b: Download complete Step #1: 800687449569: Verifying Checksum Step #1: 800687449569: Download complete Step #1: 9cb6c9480ffe: Verifying Checksum Step #1: 9cb6c9480ffe: Download complete Step #1: 636367483a85: Verifying Checksum Step #1: 636367483a85: Download complete Step #1: ab160a08f40f: Verifying Checksum Step #1: ab160a08f40f: Download complete Step #1: b549f31133a9: Pull complete Step #1: d56fb1501120: Verifying Checksum Step #1: d56fb1501120: Download complete Step #1: 6e5ee80d4b76: Verifying Checksum Step #1: 6e5ee80d4b76: Download complete Step #1: 069b70ca1828: Verifying Checksum Step #1: 069b70ca1828: Download complete Step #1: 082a5c4ba783: Verifying Checksum Step #1: 082a5c4ba783: Download complete Step #1: aeb889ce9374: Download complete Step #1: b3c77a307741: Verifying Checksum Step #1: b3c77a307741: Download complete Step #1: 19afa95abd0d: Verifying Checksum Step #1: 19afa95abd0d: Download complete Step #1: 3331bfca5447: Verifying Checksum Step #1: 3331bfca5447: Download complete Step #1: 03e6d4298870: Verifying Checksum Step #1: 03e6d4298870: Download complete Step #1: 093d0a8d4813: Verifying Checksum Step #1: 093d0a8d4813: Download complete Step #1: ca89507fe8d3: Verifying Checksum Step #1: ca89507fe8d3: Download complete Step #1: 562130e5e1f0: Download complete Step #1: c78d65770fdc: Verifying Checksum Step #1: c78d65770fdc: Download complete Step #1: d8a48a39f3bb: Verifying Checksum Step #1: d8a48a39f3bb: Download complete Step #1: cd72b15f7674: Verifying Checksum Step #1: cd72b15f7674: Download complete Step #1: fed123fa2f8a: Verifying Checksum Step #1: fed123fa2f8a: Download complete Step #1: d547270a8392: Download complete Step #1: 39a8609a58c5: Download complete Step #1: d942b3144a95: Download complete Step #1: a9e61f79d57c: Verifying Checksum Step #1: a9e61f79d57c: Download complete Step #1: 18d20619fb8d: Verifying Checksum Step #1: 18d20619fb8d: Download complete Step #1: 800687449569: Pull complete Step #1: 67cc84ed39bf: Pull complete Step #1: 30e6af2af1c7: Verifying Checksum Step #1: 30e6af2af1c7: Download complete Step #1: 33c4464df317: Pull complete Step #1: 7a3d59ffed63: Pull complete Step #1: bc24bccd8f7c: Pull complete Step #1: 18d20619fb8d: Pull complete Step #1: 0ec212d79142: Pull complete Step #1: 0d731e844f5b: Pull complete Step #1: 03e6d4298870: Pull complete Step #1: 9cb6c9480ffe: Pull complete Step #1: 636367483a85: Pull complete Step #1: ab160a08f40f: Pull complete Step #1: d56fb1501120: Pull complete Step #1: 6e5ee80d4b76: Pull complete Step #1: 069b70ca1828: Pull complete Step #1: 082a5c4ba783: Pull complete Step #1: aeb889ce9374: Pull complete Step #1: b3c77a307741: Pull complete Step #1: 19afa95abd0d: Pull complete Step #1: 3331bfca5447: Pull complete Step #1: ca89507fe8d3: Pull complete Step #1: 093d0a8d4813: Pull complete Step #1: 562130e5e1f0: Pull complete Step #1: c78d65770fdc: Pull complete Step #1: d8a48a39f3bb: Pull complete Step #1: d547270a8392: Pull complete Step #1: cd72b15f7674: Pull complete Step #1: fed123fa2f8a: Pull complete Step #1: 39a8609a58c5: Pull complete Step #1: d942b3144a95: Pull complete Step #1: 30e6af2af1c7: Pull complete Step #1: a9e61f79d57c: Pull complete Step #1: Digest: sha256:641f59e60daf76531999fb869bce29997d9552e548e382710930b708cec43039 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 17ba2eb8a017 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1: ---> Running in 46b64f895df2 Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 114 kB in 1s (107 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1: gcc set to manually installed. Step #1: libc6-dev is already the newest version (2.31-0ubuntu9.12). Step #1: wget is already the newest version (1.20.3-1ubuntu2). Step #1: The following additional packages will be installed: Step #1: libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: duperemove seccomp Step #1: The following NEW packages will be installed: Step #1: btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1: liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.2 MB of archives. Step #1: After this operation, 49.1 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.6 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.6 [6032 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.6 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.2 MB in 2s (5986 kB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17382 files and directories currently installed.) Step #1: Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.6_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.6_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.6_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package liblzo2-2:amd64. Step #1: Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1: Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1: Selecting previously unselected package btrfs-progs. Step #1: Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1: Unpacking btrfs-progs (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs0:amd64. Step #1: Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs-dev:amd64. Step #1: Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.6) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up liblzo2-2:amd64 (2.10-2) ... Step #1: Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.6) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.6) ... Step #1: Setting up btrfs-progs (5.4.1-2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.12) ... Step #1: Removing intermediate container 46b64f895df2 Step #1: ---> fa823fd62da8 Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1: ---> Running in c1db5ed04088 Step #1: Cloning into 'containerd'... Step #1: Removing intermediate container c1db5ed04088 Step #1: ---> 4af4d277970f Step #1: Step 4/6 : RUN git clone --depth=1 --branch=dev https://github.com/AdamKorcz/instrumentation Step #1: ---> Running in 374e443d12a3 Step #1: Cloning into 'instrumentation'... Step #1: Removing intermediate container 374e443d12a3 Step #1: ---> 2c06f472bd72 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> 581a4ff1e2e8 Step #1: Step 6/6 : WORKDIR $SRC/containerd Step #1: ---> Running in 47d13ca25019 Step #1: Removing intermediate container 47d13ca25019 Step #1: ---> 186901d538be Step #1: Successfully built 186901d538be Step #1: Successfully tagged gcr.io/oss-fuzz/containerd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file1Grx3P Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=39af94663cf87ba5ab72e41ae6f6409fadd3084d Step #2 - "srcmap": + jq_inplace /tmp/file1Grx3P '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file1y5PFc Step #2 - "srcmap": + cat /tmp/file1Grx3P Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "39af94663cf87ba5ab72e41ae6f6409fadd3084d" }' Step #2 - "srcmap": + mv /tmp/file1y5PFc /tmp/file1Grx3P Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=8459273f806e068e1a6bacfaf1355bbbad738d5e Step #2 - "srcmap": + jq_inplace /tmp/file1Grx3P '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "8459273f806e068e1a6bacfaf1355bbbad738d5e" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileEdwzNH Step #2 - "srcmap": + cat /tmp/file1Grx3P Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "8459273f806e068e1a6bacfaf1355bbbad738d5e" }' Step #2 - "srcmap": + mv /tmp/fileEdwzNH /tmp/file1Grx3P Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file1Grx3P Step #2 - "srcmap": + rm /tmp/file1Grx3P Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "39af94663cf87ba5ab72e41ae6f6409fadd3084d" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "8459273f806e068e1a6bacfaf1355bbbad738d5e" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-address-x86_64": + IFS=' Step #3 - "compile-libfuzzer-address-x86_64": ' Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-address-x86_64": + go run main.go /src/containerd/images Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/tools v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": + apt-get update Step #3 - "compile-libfuzzer-address-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-address-x86_64": 0% [Waiting for headers] [Waiting for headers] Hit:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-address-x86_64": 0% [Waiting for headers] [Waiting for headers] 0% [Waiting for headers] [Waiting for headers] Hit:3 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-address-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] Hit:4 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-address-x86_64": 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 33% Reading package lists... 34% Reading package lists... 34% Reading package lists... 48% Reading package lists... 48% Reading package lists... 49% Reading package lists... 49% Reading package lists... 49% Reading package lists... 49% Reading package lists... 58% Reading package lists... 58% Reading package lists... 61% Reading package lists... 61% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 73% Reading package lists... 73% Reading package lists... 75% Reading package lists... 75% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 80% Reading package lists... 84% Reading package lists... 84% Reading package lists... 86% Reading package lists... 86% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-address-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-address-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 3% Reading package lists... 3% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 33% Reading package lists... 34% Reading package lists... 34% Reading package lists... 48% Reading package lists... 48% Reading package lists... 49% Reading package lists... 49% Reading package lists... 49% Reading package lists... 49% Reading package lists... 58% Reading package lists... 58% Reading package lists... 61% Reading package lists... 61% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 69% Reading package lists... 73% Reading package lists... 73% Reading package lists... 75% Reading package lists... 75% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 76% Reading package lists... 78% Reading package lists... 84% Reading package lists... 84% Reading package lists... 86% Reading package lists... 86% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-address-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #3 - "compile-libfuzzer-address-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-address-x86_64": wget is already the newest version (1.20.3-1ubuntu2). Step #3 - "compile-libfuzzer-address-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-address-x86_64": + cd /src Step #3 - "compile-libfuzzer-address-x86_64": + wget --quiet https://go.dev/dl/go1.21.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-address-x86_64": + tar -C temp-go/ -xzf go1.21.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-address-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-address-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/containerd v1.7.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/grpc v1.58.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0-rc5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/protobuf v1.31.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20230726155614-23370e0ffb3e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/compress v1.17.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/ttrpc v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/testify v1.8.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Microsoft/hcsshim v0.12.0-rc.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/continuity v0.4.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/sys/sequential v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sys v0.13.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto v0.0.0-20230720185612-659f7aaaa771 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20230306123547-8075edf89bb0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/plugin v0.0.0-20231101173250-7ec69893e1e7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/sys/signal v0.7.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.1.1-0.20230823135140-4fec88fd00a4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/selinux v1.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/sync v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/sys/mountinfo v0.6.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/console v1.0.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/container-orchestrated-devices/container-device-interface v0.6.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/sys/user v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/urfave/cli v1.22.14 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/minio/sha256-simd v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/distribution/reference v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/go-cmp v0.5.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20230811130428-ced1acdcaa24 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/uuid v1.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/procfs v0.10.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cilium/ebpf v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/cri-api v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/go-cni v1.1.9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/intel/goresctrl v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.etcd.io/bbolt v1.3.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/nri v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/mod v0.12.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/Microsoft/hcsshim/test v0.0.0-20210227013316-43a75bb4edd3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containernetworking/cni v1.1.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/component-base v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/klog/v2 v2.100.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/utils v0.0.0-20230406110748-d93618cff8a2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_golang v1.16.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apimachinery v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/kubelet v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containernetworking/plugins v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/sys/symlink v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/fsnotify/fsnotify v1.6.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/vishvananda/netlink v1.2.1-beta.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/client-go v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading dario.cat/mergo v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.45.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/tools v0.11.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/klauspost/cpuid/v2 v2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/yaml v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/logr v1.2.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.19.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.10.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/api v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/client_model v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/prometheus/common v0.44.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/net v0.17.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.uber.org/goleak v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/gomega v1.27.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.9.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/frankban/quicktest v1.14.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/stretchr/objx v0.5.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/apiserver v0.28.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/blang/semver v3.5.1+incompatible Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/matttproud/golang_protobuf_extensions v1.0.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/onsi/ginkgo v1.16.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/protobuf v1.5.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/hashicorp/errwrap v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.2.1 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.16.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/moby/spdystream v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/rogpeppe/go-internal v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/text v0.13.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-task/slim-sprig v0.0.0-20230315185526-52ccab3ef572 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20230726155614-23370e0ffb3e Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/pprof v0.0.0-20230323073829-e72429f035bd Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/golang/glog v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/cncf/xds/go v0.0.0-20230607035331-e9ce68804cb4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/oauth2 v0.10.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/envoyproxy/protoc-gen-validate v1.0.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading google.golang.org/appengine v1.6.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/compute/metadata v0.2.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading golang.org/x/term v0.13.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20230717233707-2695361300d9 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go/compute v1.21.0 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading cloud.google.com/go v0.110.4 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/swag v0.22.3 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-address-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-address-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-address-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #3 - "compile-libfuzzer-address-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-address-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-address-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-address-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-address-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-address-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=filters Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-address-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-address-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ pkg/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=pkg/transfer/streaming Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-address-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ platforms/platforms_test.go:func FuzzPlatformsParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=platforms Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzPlatformsParse Step #3 - "compile-libfuzzer-address-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/platforms FuzzPlatformsParse fuzz_FuzzPlatformsParse Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=remotes/docker/auth Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-address-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-address-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-address-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-address-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-address-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ archive/compression/compression_fuzzer.go:func FuzzDecompressStream(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=archive/compression Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/archive/compression: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/archive/compression Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/archive/compression Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzDecompressStream -o fuzz_FuzzDecompressStream.a github.com/containerd/containerd/v2/archive/compression Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ content/local/content_local_fuzzer.go:func FuzzContentStoreWriter(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=content/local Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/content/local: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/content/local Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/content/local Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzContentStoreWriter -o fuzz_FuzzContentStoreWriter.a github.com/containerd/containerd/v2/content/local Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/apparmor/apparmor_fuzzer.go:func FuzzLoadDefaultProfile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/apparmor: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzLoadDefaultProfile -o fuzz_FuzzLoadDefaultProfile.a github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzApply -o fuzz_FuzzApply.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzImportIndex(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzImportIndex -o fuzz_FuzzImportIndex.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/containerd_import_fuzzer.go:func FuzzContainerdImport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzContainerdImport -o fuzz_FuzzContainerdImport.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzCSWalk(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzCSWalk -o fuzz_FuzzCSWalk.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzArchiveExport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzArchiveExport -o fuzz_FuzzArchiveExport.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/cri_fuzzer.go:func FuzzParseAuth(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzParseAuth -o fuzz_FuzzParseAuth.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/cri_sbserver_fuzzer.go:func FuzzCRISandboxServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzCRISandboxServer Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRISandboxServer fuzz_FuzzCRISandboxServer Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzCRISandboxServer -o fuzz_FuzzCRISandboxServer.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/cri_server_fuzzer.go:func FuzzCRIServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzCRIServer -o fuzz_FuzzCRIServer.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzDiffApply -o fuzz_FuzzDiffApply.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffCompare(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzDiffCompare -o fuzz_FuzzDiffCompare.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/exchange_fuzzer.go:func FuzzExchange(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzExchange -o fuzz_FuzzExchange.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/fuzz_images.go:func FuzzImagesCheck(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzImagesCheck -o fuzz_FuzzImagesCheck.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzImageStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzImageStore -o fuzz_FuzzImageStore.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzLeaseManager(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzLeaseManager -o fuzz_FuzzLeaseManager.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContainerStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzContainerStore -o fuzz_FuzzContainerStore.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContentStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzContentStore -o fuzz_FuzzContentStore.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ contrib/fuzz/uuid_fuzzer.go:func FuzzUUIDParse(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzUUIDParse Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzUUIDParse fuzz_FuzzUUIDParse Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzUUIDParse -o fuzz_FuzzUUIDParse.a github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ remotes/docker/config/docker_fuzzer_internal.go:func FuzzParseHostsFile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=remotes/docker/config Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/remotes/docker/config: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker/config Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker/config Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzParseHostsFile -o fuzz_FuzzParseHostsFile.a github.com/containerd/containerd/v2/remotes/docker/config Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ remotes/docker/converter_fuzz.go:func FuzzConvertManifest(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzConvertManifest -o fuzz_FuzzConvertManifest.a github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ remotes/docker/fetcher_fuzz.go:func FuzzFetcher(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzFetcher -o fuzz_FuzzFetcher.a github.com/containerd/containerd/v2/remotes/docker Step #3 - "compile-libfuzzer-address-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-address-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-address-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-address-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-address-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-address-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-address-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-address-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-address-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-address-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-address-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-address-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-address-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-address-x86_64": remote: Enumerating objects: 41318, done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Counting objects: 0% (1/9046) remote: Counting objects: 1% (91/9046) remote: Counting objects: 2% (181/9046) remote: Counting objects: 3% (272/9046) remote: Counting objects: 4% (362/9046) remote: Counting objects: 5% (453/9046) remote: Counting objects: 6% (543/9046) remote: Counting objects: 7% (634/9046) remote: Counting objects: 8% (724/9046) remote: Counting objects: 9% (815/9046) remote: Counting objects: 10% (905/9046) remote: Counting objects: 11% (996/9046) remote: Counting objects: 12% (1086/9046) remote: Counting objects: 13% (1176/9046) remote: Counting objects: 14% (1267/9046) remote: Counting objects: 15% (1357/9046) remote: Counting objects: 16% (1448/9046) remote: Counting objects: 17% (1538/9046) remote: Counting objects: 18% (1629/9046) remote: Counting objects: 19% (1719/9046) remote: Counting objects: 20% (1810/9046) remote: Counting objects: 21% (1900/9046) remote: Counting objects: 22% (1991/9046) remote: Counting objects: 23% (2081/9046) remote: Counting objects: 24% (2172/9046) remote: Counting objects: 25% (2262/9046) remote: Counting objects: 26% (2352/9046) remote: Counting objects: 27% (2443/9046) remote: Counting objects: 28% (2533/9046) remote: Counting objects: 29% (2624/9046) remote: Counting objects: 30% (2714/9046) remote: Counting objects: 31% (2805/9046) remote: Counting objects: 32% (2895/9046) remote: Counting objects: 33% (2986/9046) remote: Counting objects: 34% (3076/9046) remote: Counting objects: 35% (3167/9046) remote: Counting objects: 36% (3257/9046) remote: Counting objects: 37% (3348/9046) remote: Counting objects: 38% (3438/9046) remote: Counting objects: 39% (3528/9046) remote: Counting objects: 40% (3619/9046) remote: Counting objects: 41% (3709/9046) remote: Counting objects: 42% (3800/9046) remote: Counting objects: 43% (3890/9046) remote: Counting objects: 44% (3981/9046) remote: Counting objects: 45% (4071/9046) remote: Counting objects: 46% (4162/9046) remote: Counting objects: 47% (4252/9046) remote: Counting objects: 48% (4343/9046) remote: Counting objects: 49% (4433/9046) remote: Counting objects: 50% (4523/9046) remote: Counting objects: 51% (4614/9046) remote: Counting objects: 52% (4704/9046) remote: Counting objects: 53% (4795/9046) remote: Counting objects: 54% (4885/9046) remote: Counting objects: 55% (4976/9046) remote: Counting objects: 56% (5066/9046) remote: Counting objects: 57% (5157/9046) remote: Counting objects: 58% (5247/9046) remote: Counting objects: 59% (5338/9046) remote: Counting objects: 60% (5428/9046) remote: Counting objects: 61% (5519/9046) remote: Counting objects: 62% (5609/9046) remote: Counting objects: 63% (5699/9046) remote: Counting objects: 64% (5790/9046) remote: Counting objects: 65% (5880/9046) remote: Counting objects: 66% (5971/9046) remote: Counting objects: 67% (6061/9046) remote: Counting objects: 68% (6152/9046) remote: Counting objects: 69% (6242/9046) remote: Counting objects: 70% (6333/9046) remote: Counting objects: 71% (6423/9046) remote: Counting objects: 72% (6514/9046) remote: Counting objects: 73% (6604/9046) remote: Counting objects: 74% (6695/9046) remote: Counting objects: 75% (6785/9046) remote: Counting objects: 76% (6875/9046) remote: Counting objects: 77% (6966/9046) remote: Counting objects: 78% (7056/9046) remote: Counting objects: 79% (7147/9046) remote: Counting objects: 80% (7237/9046) remote: Counting objects: 81% (7328/9046) remote: Counting objects: 82% (7418/9046) remote: Counting objects: 83% (7509/9046) remote: Counting objects: 84% (7599/9046) remote: Counting objects: 85% (7690/9046) remote: Counting objects: 86% (7780/9046) remote: Counting objects: 87% (7871/9046) remote: Counting objects: 88% (7961/9046) remote: Counting objects: 89% (8051/9046) remote: Counting objects: 90% (8142/9046) remote: Counting objects: 91% (8232/9046) remote: Counting objects: 92% (8323/9046) remote: Counting objects: 93% (8413/9046) remote: Counting objects: 94% (8504/9046) remote: Counting objects: 95% (8594/9046) remote: Counting objects: 96% (8685/9046) remote: Counting objects: 97% (8775/9046) remote: Counting objects: 98% (8866/9046) remote: Counting objects: 99% (8956/9046) remote: Counting objects: 100% (9046/9046) remote: Counting objects: 100% (9046/9046), done. Step #3 - "compile-libfuzzer-address-x86_64": remote: Compressing objects: 0% (1/1097) remote: Compressing objects: 1% (11/1097) remote: Compressing objects: 2% (22/1097) remote: Compressing objects: 3% (33/1097) remote: Compressing objects: 4% (44/1097) remote: Compressing objects: 5% (55/1097) remote: Compressing objects: 6% (66/1097) remote: Compressing objects: 7% (77/1097) remote: Compressing objects: 8% (88/1097) remote: Compressing objects: 9% (99/1097) remote: Compressing objects: 10% (110/1097) remote: Compressing objects: 11% (121/1097) remote: Compressing objects: 12% (132/1097) remote: Compressing objects: 13% (143/1097) remote: Compressing objects: 14% (154/1097) remote: Compressing objects: 15% (165/1097) remote: Compressing objects: 16% (176/1097) remote: Compressing objects: 17% (187/1097) remote: Compressing objects: 18% (198/1097) remote: Compressing objects: 19% (209/1097) remote: Compressing objects: 20% (220/1097) remote: Compressing objects: 21% (231/1097) remote: Compressing objects: 22% (242/1097) remote: Compressing objects: 23% (253/1097) remote: Compressing objects: 24% (264/1097) remote: Compressing objects: 25% (275/1097) remote: Compressing objects: 26% (286/1097) remote: Compressing objects: 27% (297/1097) remote: Compressing objects: 28% (308/1097) remote: Compressing objects: 29% (319/1097) remote: Compressing objects: 30% (330/1097) remote: Compressing objects: 31% (341/1097) remote: Compressing objects: 32% (352/1097) remote: Compressing objects: 33% (363/1097) remote: Compressing objects: 34% (373/1097) remote: Compressing objects: 35% (384/1097) remote: Compressing objects: 36% (395/1097) remote: Compressing objects: 37% (406/1097) remote: Compressing objects: 38% (417/1097) remote: Compressing objects: 39% (428/1097) remote: Compressing objects: 40% (439/1097) remote: Compressing objects: 41% (450/1097) remote: Compressing objects: 42% (461/1097) remote: Compressing objects: 43% (472/1097) remote: Compressing objects: 44% (483/1097) remote: Compressing objects: 45% (494/1097) remote: Compressing objects: 46% (505/1097) remote: Compressing objects: 47% (516/1097) remote: Compressing objects: 48% (527/1097) remote: Compressing objects: 49% (538/1097) remote: Compressing objects: 50% (549/1097) remote: Compressing objects: 51% (560/1097) remote: Compressing objects: 52% (571/1097) remote: Compressing objects: 53% (582/1097) remote: Compressing objects: 54% (593/1097) remote: Compressing objects: 55% (604/1097) remote: Compressing objects: 56% (615/1097) remote: Compressing objects: 57% (626/1097) remote: Compressing objects: 58% (637/1097) remote: Compressing objects: 59% (648/1097) remote: Compressing objects: 60% (659/1097) remote: Compressing objects: 61% (670/1097) remote: Compressing objects: 62% (681/1097) remote: Compressing objects: 63% (692/1097) remote: Compressing objects: 64% (703/1097) remote: Compressing objects: 65% (714/1097) remote: Compressing objects: 66% (725/1097) remote: Compressing objects: 67% (735/1097) remote: Compressing objects: 68% (746/1097) remote: Compressing objects: 69% (757/1097) remote: Compressing objects: 70% (768/1097) remote: Compressing objects: 71% (779/1097) remote: Compressing objects: 72% (790/1097) remote: Compressing objects: 73% (801/1097) remote: Compressing objects: 74% (812/1097) remote: Compressing objects: 75% (823/1097) remote: Compressing objects: 76% (834/1097) remote: Compressing objects: 77% (845/1097) remote: Compressing objects: 78% (856/1097) remote: Compressing objects: 79% (867/1097) remote: Compressing objects: 80% (878/1097) remote: Compressing objects: 81% (889/1097) remote: Compressing objects: 82% (900/1097) remote: Compressing objects: 83% (911/1097) remote: Compressing objects: 84% (922/1097) remote: Compressing objects: 85% (933/1097) remote: Compressing objects: 86% (944/1097) remote: Compressing objects: 87% (955/1097) remote: Compressing objects: 88% (966/1097) remote: Compressing objects: 89% (977/1097) remote: Compressing objects: 90% (988/1097) remote: Compressing objects: 91% (999/1097) remote: Compressing objects: 92% (1010/1097) remote: Compressing objects: 93% (1021/1097) remote: Compressing objects: 94% (1032/1097) remote: Compressing objects: 95% (1043/1097) remote: Compressing objects: 96% (1054/1097) remote: Compressing objects: 97% (1065/1097) remote: Compressing objects: 98% (1076/1097) remote: Compressing objects: 99% (1087/1097) remote: Compressing objects: 100% (1097/1097) remote: Compressing objects: 100% (1097/1097), done. Step #3 - "compile-libfuzzer-address-x86_64": Receiving objects: 0% (1/41318) Receiving objects: 1% (414/41318) Receiving objects: 2% (827/41318) Receiving objects: 3% (1240/41318) Receiving objects: 4% (1653/41318) Receiving objects: 5% (2066/41318) Receiving objects: 6% (2480/41318) Receiving objects: 7% (2893/41318) Receiving objects: 8% (3306/41318) Receiving objects: 9% (3719/41318) Receiving objects: 10% (4132/41318) Receiving objects: 11% (4545/41318) Receiving objects: 12% (4959/41318) Receiving objects: 13% (5372/41318) Receiving objects: 14% (5785/41318) Receiving objects: 15% (6198/41318) Receiving objects: 16% (6611/41318) Receiving objects: 17% (7025/41318) Receiving objects: 18% (7438/41318) Receiving objects: 19% (7851/41318) Receiving objects: 20% (8264/41318) Receiving objects: 21% (8677/41318) Receiving objects: 22% (9090/41318) Receiving objects: 23% (9504/41318) Receiving objects: 24% (9917/41318) Receiving objects: 25% (10330/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 26% (10743/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 27% (11156/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 28% (11570/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 29% (11983/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 30% (12396/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 31% (12809/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 32% (13222/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 33% (13635/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 34% (14049/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 35% (14462/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 36% (14875/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 37% (15288/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 38% (15701/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 39% (16115/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 40% (16528/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 41% (16941/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 42% (17354/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 43% (17767/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 44% (18180/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 45% (18594/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 46% (19007/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 47% (19420/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 48% (19833/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 48% (20024/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 49% (20246/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 50% (20659/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 51% (21073/41318), 3.57 MiB | 7.03 MiB/s Receiving objects: 52% (21486/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 53% (21899/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 54% (22312/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 55% (22725/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 56% (23139/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 57% (23552/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 58% (23965/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 59% (24378/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 60% (24791/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 61% (25204/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 62% (25618/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 63% (26031/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 64% (26444/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 65% (26857/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 66% (27270/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 67% (27684/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 68% (28097/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 69% (28510/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 70% (28923/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 71% (29336/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 72% (29749/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 73% (30163/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 74% (30576/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 75% (30989/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 76% (31402/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 77% (31815/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 78% (32229/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 79% (32642/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 80% (33055/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 81% (33468/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 82% (33881/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 83% (34294/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 84% (34708/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 85% (35121/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 86% (35534/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 87% (35947/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 88% (36360/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 89% (36774/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 90% (37187/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 91% (37600/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 92% (38013/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 93% (38426/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 94% (38839/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 95% (39253/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 96% (39666/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 97% (40079/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 98% (40492/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 99% (40905/41318), 10.93 MiB | 10.81 MiB/s remote: Total 41318 (delta 8204), reused 8143 (delta 7939), pack-reused 32272 Step #3 - "compile-libfuzzer-address-x86_64": Receiving objects: 100% (41318/41318), 10.93 MiB | 10.81 MiB/s Receiving objects: 100% (41318/41318), 19.43 MiB | 14.83 MiB/s, done. Step #3 - "compile-libfuzzer-address-x86_64": Resolving deltas: 0% (0/27413) Resolving deltas: 1% (282/27413) Resolving deltas: 2% (551/27413) Resolving deltas: 3% (847/27413) Resolving deltas: 4% (1105/27413) Resolving deltas: 5% (1408/27413) Resolving deltas: 6% (1709/27413) Resolving deltas: 7% (1928/27413) Resolving deltas: 8% (2194/27413) Resolving deltas: 9% (2479/27413) Resolving deltas: 10% (2769/27413) Resolving deltas: 11% (3063/27413) Resolving deltas: 12% (3316/27413) Resolving deltas: 13% (3564/27413) Resolving deltas: 14% (3871/27413) Resolving deltas: 15% (4115/27413) Resolving deltas: 16% (4391/27413) Resolving deltas: 17% (4734/27413) Resolving deltas: 18% (5061/27413) Resolving deltas: 19% (5278/27413) Resolving deltas: 20% (5536/27413) Resolving deltas: 21% (5788/27413) Resolving deltas: 22% (6035/27413) Resolving deltas: 23% (6312/27413) Resolving deltas: 24% (6771/27413) Resolving deltas: 25% (6857/27413) Resolving deltas: 26% (7130/27413) Resolving deltas: 27% (7568/27413) Resolving deltas: 28% (7677/27413) Resolving deltas: 29% (8027/27413) Resolving deltas: 30% (8243/27413) Resolving deltas: 31% (8509/27413) Resolving deltas: 32% (8797/27413) Resolving deltas: 33% (9054/27413) Resolving deltas: 34% (9333/27413) Resolving deltas: 35% (9606/27413) Resolving deltas: 36% (9885/27413) Resolving deltas: 37% (10179/27413) Resolving deltas: 38% (10419/27413) Resolving deltas: 39% (10705/27413) Resolving deltas: 40% (10968/27413) Resolving deltas: 41% (11248/27413) Resolving deltas: 42% (11539/27413) Resolving deltas: 43% (11793/27413) Resolving deltas: 44% (12064/27413) Resolving deltas: 45% (12338/27413) Resolving deltas: 46% (12653/27413) Resolving deltas: 47% (12902/27413) Resolving deltas: 48% (13183/27413) Resolving deltas: 49% (13458/27413) Resolving deltas: 50% (13727/27413) Resolving deltas: 51% (13985/27413) Resolving deltas: 52% (14259/27413) Resolving deltas: 53% (14529/27413) Resolving deltas: 54% (14822/27413) Resolving deltas: 55% (15084/27413) Resolving deltas: 56% (15362/27413) Resolving deltas: 57% (15652/27413) Resolving deltas: 58% (15923/27413) Resolving deltas: 59% (16174/27413) Resolving deltas: 60% (16454/27413) Resolving deltas: 61% (16738/27413) Resolving deltas: 62% (17007/27413) Resolving deltas: 63% (17272/27413) Resolving deltas: 64% (17545/27413) Resolving deltas: 65% (17819/27413) Resolving deltas: 66% (18145/27413) Resolving deltas: 67% (18385/27413) Resolving deltas: 68% (18642/27413) Resolving deltas: 69% (18918/27413) Resolving deltas: 70% (19202/27413) Resolving deltas: 71% (19491/27413) Resolving deltas: 73% (20150/27413) Resolving deltas: 74% (20391/27413) Resolving deltas: 75% (20829/27413) Resolving deltas: 76% (20857/27413) Resolving deltas: 77% (21150/27413) Resolving deltas: 79% (21684/27413) Resolving deltas: 80% (21968/27413) Resolving deltas: 81% (22230/27413) Resolving deltas: 82% (22487/27413) Resolving deltas: 83% (22871/27413) Resolving deltas: 84% (23261/27413) Resolving deltas: 85% (23343/27413) Resolving deltas: 86% (23591/27413) Resolving deltas: 87% (23852/27413) Resolving deltas: 88% (24126/27413) Resolving deltas: 89% (24434/27413) Resolving deltas: 90% (24695/27413) Resolving deltas: 91% (24961/27413) Resolving deltas: 92% (25224/27413) Resolving deltas: 93% (25691/27413) Resolving deltas: 94% (25804/27413) Resolving deltas: 95% (26086/27413) Resolving deltas: 96% (26334/27413) Resolving deltas: 97% (26591/27413) Resolving deltas: 98% (26895/27413) Resolving deltas: 99% (27140/27413) Resolving deltas: 100% (27413/27413) Resolving deltas: 100% (27413/27413), done. Step #3 - "compile-libfuzzer-address-x86_64": + cd runc Step #3 - "compile-libfuzzer-address-x86_64": + make Step #3 - "compile-libfuzzer-address-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.10-2-gf3446b1e -X main.version=1.1.10+dev " -o runc . Step #3 - "compile-libfuzzer-address-x86_64": + make install Step #3 - "compile-libfuzzer-address-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-address-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-address-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-address-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=8459273.m -X github.com/containerd/containerd/v2/version.Revision=8459273f806e068e1a6bacfaf1355bbbad738d5e.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-address-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-address-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=8459273.m -X github.com/containerd/containerd/v2/version.Revision=8459273f806e068e1a6bacfaf1355bbbad738d5e.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-address-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-address-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=8459273.m -X github.com/containerd/containerd/v2/version.Revision=8459273f806e068e1a6bacfaf1355bbbad738d5e.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-address-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-address-x86_64": + binaries Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /workspace/out/libfuzzer-address-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-address-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-address-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-address-x86_64": + cd - Step #3 - "compile-libfuzzer-address-x86_64": /src/containerd Step #3 - "compile-libfuzzer-address-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-address-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-address-x86_64": + compile_fuzzers '^func FuzzInteg.*data' compile_go_fuzzer vendor Step #3 - "compile-libfuzzer-address-x86_64": + local 'regex=^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-address-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-address-x86_64": ++ git grep --full-name '^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-address-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegNoTearDownWithDownload(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzIntegNoTearDownWithDownload -o fuzz_FuzzIntegNoTearDownWithDownload.a github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerNoTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzIntegCreateContainerNoTearDown -o fuzz_FuzzIntegCreateContainerNoTearDown.a github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-address-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerWithTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-address-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-address-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzIntegCreateContainerWithTearDown -o fuzz_FuzzIntegCreateContainerWithTearDown.a github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-address-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-address-x86_64/ Step #3 - "compile-libfuzzer-address-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-address-x86_64/ Step #3 - "compile-libfuzzer-address-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Step #3 - "compile-libfuzzer-address-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 800687449569: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 67cc84ed39bf: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 4f9c5aaef41d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 70a3154e11f3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4fab6a53b47e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2c8974b97e3f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fa34d2d81dbe: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 25703bb604aa: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c73cf34df98f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 52a1fd76d509: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6887dca9f6f7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 9d450e2f2926: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": caeaffc0bf5a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5bddf29a1eb5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5123d679bab9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cd3fe814a4bf: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2c8974b97e3f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6887dca9f6f7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fa34d2d81dbe: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 25703bb604aa: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9d450e2f2926: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": caeaffc0bf5a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c73cf34df98f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 52a1fd76d509: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5123d679bab9: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": cd3fe814a4bf: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5bddf29a1eb5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4fab6a53b47e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4fab6a53b47e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4f9c5aaef41d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4f9c5aaef41d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 70a3154e11f3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 70a3154e11f3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fa34d2d81dbe: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fa34d2d81dbe: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4f9c5aaef41d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 25703bb604aa: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 25703bb604aa: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c73cf34df98f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c73cf34df98f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 6887dca9f6f7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6887dca9f6f7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 70a3154e11f3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 52a1fd76d509: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 52a1fd76d509: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4fab6a53b47e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": caeaffc0bf5a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": caeaffc0bf5a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2c8974b97e3f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2c8974b97e3f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5bddf29a1eb5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5bddf29a1eb5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": cd3fe814a4bf: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9d450e2f2926: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 9d450e2f2926: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5123d679bab9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5123d679bab9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2c8974b97e3f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fa34d2d81dbe: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 25703bb604aa: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c73cf34df98f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 52a1fd76d509: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6887dca9f6f7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9d450e2f2926: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": caeaffc0bf5a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5bddf29a1eb5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5123d679bab9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": cd3fe814a4bf: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:f6046c5172da95c6c285c79de830b29f4115d542fe22b864a5dbc1432da29528 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzContentStore Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzImagesCheck Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzArchiveExport Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzExchange Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzPlatformsParse Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzDecompressStream Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzConvertManifest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzDiffCompare Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzParseHostsFile Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzSendAndReceive Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzImageStore Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzApply Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzImportIndex Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzUUIDParse Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzFetcher Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzIntegCreateContainerWithTearDown Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzFiltersParse Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzParseAuthHeader Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzLeaseManager Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzParseAuth Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzIntegCreateContainerNoTearDown Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzContainerdImport Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzLoadDefaultProfile Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzIntegNoTearDownWithDownload Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzContentStoreWriter Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzDiffApply Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzContainerStore Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzParseProcPIDStatus Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzCSWalk Step #4 - "build-check-libfuzzer-address-x86_64": Retrying failed fuzz targets sequentially 2 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer Step #4 - "build-check-libfuzzer-address-x86_64": Broken fuzz targets 2 Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer'], returncode=1, stdout=b'BAD BUILD: /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer seems to have either startup crash or exit:\n/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (274301 inline 8-bit counters): 274301 [0x3ea86d0, 0x3eeb64d), \nINFO: Loaded 1 PC tables (274301 PCs): 274301 [0x10c000100000,0x10c00052f7d0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:48Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1\ntime="2023-12-01T06:43:48Z" level=info msg="metadata content store policy set" policy=shared\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.monitor.v1.cgroups type=io.containerd.monitor.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.shim type=io.containerd.runtime.v2\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.podsandbox type=io.containerd.sandbox.controller.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.internal.v1.restart type=io.containerd.internal.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1\ntime="2023-12-01T06:43:48Z" level=info msg="NRI interface is disabled by configuration."\ntime="2023-12-01T06:43:48Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.cri type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:48Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: PodAnnotations:[] ContainerAnnotations:[] Options:map[BinaryName: CriuImagePath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false Root: ShimCgroup:] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: Sandboxer:podsandbox}] DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.9 StatsCollectPeriod:10 EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:true EnableUnprivilegedICMP:true EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/tmp/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/tmp/containerd/io.containerd.grpc.v1.cri}"\ntime="2023-12-01T06:43:48Z" level=info msg="Connect containerd service"\ntime="2023-12-01T06:43:48Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this"\ntime="2023-12-01T06:43:48Z" level=info msg="Get image filesystem path \\"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\\" for snapshotter \\"overlayfs\\""\ntime="2023-12-01T06:43:48Z" level=info msg="Start snapshots syncer"\ntime="2023-12-01T06:43:48Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"\ntime="2023-12-01T06:43:48Z" level=info msg="Start subscribing containerd event"\ntime="2023-12-01T06:43:48Z" level=info msg="Start recovering state"\ntime="2023-12-01T06:43:48Z" level=info msg="Start event monitor"\ntime="2023-12-01T06:43:48Z" level=info msg="Start cni network conf syncer for default"\ntime="2023-12-01T06:43:48Z" level=info msg="Start streaming server"\ntime="2023-12-01T06:43:48Z" level=info msg="Get image filesystem path \\"io.containerd.snapshotter.v1.\\" for snapshotter \\"\\""\ntime="2023-12-01T06:43:48Z" level=info msg="Start snapshots syncer"\npanic: non-positive interval for NewTicker\n\ngoroutine 17 [running, locked to thread]:\ntime.NewTicker(0x0)\n\ttime/tick.go:22 +0x145\ngithub.com/containerd/containerd/v2/pkg/cri/server/images.(*snapshotsSyncer).start(0x10c0000121c8)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/images/snapshots.go:55 +0x45\ngithub.com/containerd/containerd/v2/pkg/cri/server/images.NewService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/images/service.go:92 +0x865\ngithub.com/containerd/containerd/v2/pkg/cri/server.NewCRIService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/service.go:159 +0x70e\ngithub.com/containerd/containerd/v2/contrib/fuzz.FuzzCRIServer({0x602000000090, 0x0, 0x0})\n\tgithub.com/containerd/containerd/v2/contrib/fuzz/cri_server_fuzzer.go:40 +0x25a\nmain.LLVMFuzzerTestOneInput(...)\n\t./main.368377449.go:21\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==1512==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000005e8 (pc 0x0000005e4e41 bp 0x10c000636cb8 sp 0x10c000636ca0 T0)\nSCARINESS: 10 (signal)\n #0 0x5e4e41 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==1512==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix=\'./\'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n', stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRIServer -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (274301 inline 8-bit counters): 274301 [0x3ea86d0, 0x3eeb64d), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (274301 PCs): 274301 [0x10c000100000,0x10c00052f7d0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="metadata content store policy set" policy=shared Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.monitor.v1.cgroups type=io.containerd.monitor.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.shim type=io.containerd.runtime.v2 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.podsandbox type=io.containerd.sandbox.controller.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.internal.v1.restart type=io.containerd.internal.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="NRI interface is disabled by configuration." Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.cri type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: PodAnnotations:[] ContainerAnnotations:[] Options:map[BinaryName: CriuImagePath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false Root: ShimCgroup:] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: Sandboxer:podsandbox}] DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.9 StatsCollectPeriod:10 EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:true EnableUnprivilegedICMP:true EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/tmp/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/tmp/containerd/io.containerd.grpc.v1.cri}" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Connect containerd service" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start snapshots syncer" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start subscribing containerd event" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start recovering state" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start event monitor" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start cni network conf syncer for default" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start streaming server" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Get image filesystem path \"io.containerd.snapshotter.v1.\" for snapshotter \"\"" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:46:07Z" level=info msg="Start snapshots syncer" Step #4 - "build-check-libfuzzer-address-x86_64": panic: non-positive interval for NewTicker Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": time.NewTicker(0x0) Step #4 - "build-check-libfuzzer-address-x86_64": time/tick.go:22 +0x145 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images.(*snapshotsSyncer).start(0x10c000e3a0d8) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images/snapshots.go:55 +0x45 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images.NewService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images/service.go:92 +0x865 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server.NewCRIService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/service.go:159 +0x70e Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz.FuzzCRIServer({0x602000000090, 0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz/cri_server_fuzzer.go:40 +0x25a Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(...) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.368377449.go:21 Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==1699==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000006a3 (pc 0x0000005e4e41 bp 0x10c000f9acb8 sp 0x10c000f9aca0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x5e4e41 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==1699==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": ('/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer', CompletedProcess(args=['bad_build_check', '/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer'], returncode=1, stdout=b'BAD BUILD: /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer seems to have either startup crash or exit:\n/tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null\nINFO: Running with entropic power schedule (0xFF, 100).\nINFO: Seed: 1337\nINFO: Loaded 1 modules (274301 inline 8-bit counters): 274301 [0x3ea86d0, 0x3eeb64d), \nINFO: Loaded 1 PC tables (274301 PCs): 274301 [0x10c000100000,0x10c00052f7d0), \nINFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:39Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1\ntime="2023-12-01T06:43:39Z" level=info msg="metadata content store policy set" policy=shared\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.monitor.v1.cgroups type=io.containerd.monitor.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.shim type=io.containerd.runtime.v2\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.podsandbox type=io.containerd.sandbox.controller.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.internal.v1.restart type=io.containerd.internal.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1\ntime="2023-12-01T06:43:39Z" level=info msg="NRI interface is disabled by configuration."\ntime="2023-12-01T06:43:39Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.cri type=io.containerd.grpc.v1\ntime="2023-12-01T06:43:39Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: PodAnnotations:[] ContainerAnnotations:[] Options:map[BinaryName: CriuImagePath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false Root: ShimCgroup:] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: Sandboxer:podsandbox}] DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.9 StatsCollectPeriod:10 EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:true EnableUnprivilegedICMP:true EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/tmp/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/tmp/containerd/io.containerd.grpc.v1.cri}"\ntime="2023-12-01T06:43:39Z" level=info msg="Connect containerd service"\ntime="2023-12-01T06:43:39Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this"\ntime="2023-12-01T06:43:39Z" level=info msg="Get image filesystem path \\"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\\" for snapshotter \\"overlayfs\\""\ntime="2023-12-01T06:43:39Z" level=info msg="Start snapshots syncer"\ntime="2023-12-01T06:43:39Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config"\ntime="2023-12-01T06:43:39Z" level=info msg="Start subscribing containerd event"\ntime="2023-12-01T06:43:39Z" level=info msg="Start recovering state"\ntime="2023-12-01T06:43:39Z" level=info msg="Start event monitor"\ntime="2023-12-01T06:43:39Z" level=info msg="Start cni network conf syncer for default"\ntime="2023-12-01T06:43:39Z" level=info msg="Start streaming server"\ntime="2023-12-01T06:43:39Z" level=info msg="Get image filesystem path \\"io.containerd.snapshotter.v1.\\" for snapshotter \\"\\""\ntime="2023-12-01T06:43:39Z" level=info msg="Start snapshots syncer"\npanic: non-positive interval for NewTicker\n\ngoroutine 17 [running, locked to thread]:\ntime.NewTicker(0x0)\n\ttime/tick.go:22 +0x145\ngithub.com/containerd/containerd/v2/pkg/cri/server/images.(*snapshotsSyncer).start(0x10c000a4c0f0)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/images/snapshots.go:55 +0x45\ngithub.com/containerd/containerd/v2/pkg/cri/server/images.NewService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/images/service.go:92 +0x865\ngithub.com/containerd/containerd/v2/pkg/cri/server.NewCRIService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...)\n\tgithub.com/containerd/containerd/v2/pkg/cri/server/service.go:159 +0x70e\ngithub.com/containerd/containerd/v2/contrib/fuzz.FuzzCRISandboxServer({0x602000000090, 0x0, 0x0})\n\tgithub.com/containerd/containerd/v2/contrib/fuzz/cri_sbserver_fuzzer.go:40 +0x25a\nmain.LLVMFuzzerTestOneInput(...)\n\t./main.2910751134.go:21\nAddressSanitizer:DEADLYSIGNAL\n=================================================================\n==1282==ERROR: AddressSanitizer: ABRT on unknown address 0x000000000502 (pc 0x0000005e4e41 bp 0x10c000f86cb8 sp 0x10c000f86ca0 T0)\nSCARINESS: 10 (signal)\n #0 0x5e4e41 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154\n\nDEDUP_TOKEN: runtime.raise.abi0\nAddressSanitizer can not provide additional info.\nSUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0\n==1282==ABORTING\nMS: 0 ; base unit: 0000000000000000000000000000000000000000\n\n\nartifact_prefix=\'./\'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709\nBase64: \n', stderr=b'')) Step #4 - "build-check-libfuzzer-address-x86_64": BAD BUILD: /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer seems to have either startup crash or exit: Step #4 - "build-check-libfuzzer-address-x86_64": /tmp/not-out/tmpdikmehvr/fuzz_FuzzCRISandboxServer -rss_limit_mb=2560 -timeout=25 -seed=1337 -runs=4 < /dev/null Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Running with entropic power schedule (0xFF, 100). Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Seed: 1337 Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 modules (274301 inline 8-bit counters): 274301 [0x3ea86d0, 0x3eeb64d), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: Loaded 1 PC tables (274301 PCs): 274301 [0x10c000100000,0x10c00052f7d0), Step #4 - "build-check-libfuzzer-address-x86_64": INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 4096 bytes Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.image-verifier.v1.bindir type=io.containerd.image-verifier.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.internal.v1.opt type=io.containerd.internal.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.warning.v1.deprecations type=io.containerd.warning.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.event.v1.exchange type=io.containerd.event.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.content.v1.content type=io.containerd.content.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="skip loading plugin" error="no scratch file generator: skip plugin" id=io.containerd.snapshotter.v1.blockfile type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.native type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.snapshotter.v1.overlayfs type=io.containerd.snapshotter.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.metadata.v1.bolt type=io.containerd.metadata.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="metadata content store policy set" policy=shared Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.gc.v1.scheduler type=io.containerd.gc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.monitor.v1.cgroups type=io.containerd.monitor.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.events type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.introspection-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.containers-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.content-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.differ.v1.walking type=io.containerd.differ.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.diff-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.images-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.namespaces-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.snapshots-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.task type=io.containerd.runtime.v2 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.runtime.v2.shim type=io.containerd.runtime.v2 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.service.v1.tasks-service type=io.containerd.service.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.introspection type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.lease.v1.manager type=io.containerd.lease.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.leases type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.sandbox.store.v1.local type=io.containerd.sandbox.store.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.shim type=io.containerd.sandbox.controller.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.sandbox.controller.v1.podsandbox type=io.containerd.sandbox.controller.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandbox-controllers type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.sandboxes type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.streaming.v1.manager type=io.containerd.streaming.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.streaming type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.transfer.v1.local type=io.containerd.transfer.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.transfer type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.version type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.containers type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.content type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.diff type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.images type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.namespaces type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.snapshots type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.tasks type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.internal.v1.restart type=io.containerd.internal.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.healthcheck type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.nri.v1.nri type=io.containerd.nri.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="NRI interface is disabled by configuration." Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="loading plugin" id=io.containerd.grpc.v1.cri type=io.containerd.grpc.v1 Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: PodAnnotations:[] ContainerAnnotations:[] Options:map[BinaryName: CriuImagePath: CriuWorkPath: IoGid:0 IoUid:0 NoNewKeyring:false Root: ShimCgroup:] PrivilegedWithoutHostDevices:false PrivilegedWithoutHostDevicesAllDevicesAllowed:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0 Snapshotter: Sandboxer:podsandbox}] DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreBlockIONotEnabledErrors:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginSetupSerially:false NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:false SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.9 StatsCollectPeriod:10 EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:true EnableUnprivilegedICMP:true EnableCDI:false CDISpecDirs:[/etc/cdi /var/run/cdi] ImagePullProgressTimeout:5m0s DrainExecSyncIOTimeout:0s} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/tmp/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/tmp/containerd/io.containerd.grpc.v1.cri}" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Connect containerd service" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="using experimental NRI integration - disable nri plugin to prevent this" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\" for snapshotter \"overlayfs\"" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start snapshots syncer" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start subscribing containerd event" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start recovering state" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start event monitor" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start cni network conf syncer for default" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start streaming server" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Get image filesystem path \"io.containerd.snapshotter.v1.\" for snapshotter \"\"" Step #4 - "build-check-libfuzzer-address-x86_64": time="2023-12-01T06:47:10Z" level=info msg="Start snapshots syncer" Step #4 - "build-check-libfuzzer-address-x86_64": panic: non-positive interval for NewTicker Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": goroutine 17 [running, locked to thread]: Step #4 - "build-check-libfuzzer-address-x86_64": time.NewTicker(0x0) Step #4 - "build-check-libfuzzer-address-x86_64": time/tick.go:22 +0x145 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images.(*snapshotsSyncer).start(0x10c000d260a8) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images/snapshots.go:55 +0x45 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images.NewService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/images/service.go:92 +0x865 Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server.NewCRIService({{{{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0}, {{0x0, ...}, ...}, ...}, ...}, ...) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/pkg/cri/server/service.go:159 +0x70e Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz.FuzzCRISandboxServer({0x602000000090, 0x0, 0x0}) Step #4 - "build-check-libfuzzer-address-x86_64": github.com/containerd/containerd/v2/contrib/fuzz/cri_sbserver_fuzzer.go:40 +0x25a Step #4 - "build-check-libfuzzer-address-x86_64": main.LLVMFuzzerTestOneInput(...) Step #4 - "build-check-libfuzzer-address-x86_64": ./main.2910751134.go:21 Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer:DEADLYSIGNAL Step #4 - "build-check-libfuzzer-address-x86_64": ================================================================= Step #4 - "build-check-libfuzzer-address-x86_64": ==1764==ERROR: AddressSanitizer: ABRT on unknown address 0x0000000006e4 (pc 0x0000005e4e41 bp 0x10c00065ecb8 sp 0x10c00065eca0 T0) Step #4 - "build-check-libfuzzer-address-x86_64": SCARINESS: 10 (signal) Step #4 - "build-check-libfuzzer-address-x86_64": #0 0x5e4e41 in runtime.raise.abi0 runtime/sys_linux_amd64.s:154 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": DEDUP_TOKEN: runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": AddressSanitizer can not provide additional info. Step #4 - "build-check-libfuzzer-address-x86_64": SUMMARY: AddressSanitizer: ABRT runtime/sys_linux_amd64.s:154 in runtime.raise.abi0 Step #4 - "build-check-libfuzzer-address-x86_64": ==1764==ABORTING Step #4 - "build-check-libfuzzer-address-x86_64": MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": artifact_prefix='./'; Test unit written to ./crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #4 - "build-check-libfuzzer-address-x86_64": Base64: Step #4 - "build-check-libfuzzer-address-x86_64": Step #4 - "build-check-libfuzzer-address-x86_64": 31 fuzzers total, 2 seem to be broken (6.451612903225806%). Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/containerd Step #6: adding: containerd-binaries/ (stored 0%) Step #6: adding: containerd-binaries/containerd-shim-runc-v2 (deflated 62%) Step #6: adding: containerd-binaries/containerd-stress (deflated 64%) Step #6: adding: containerd-binaries/containerd (deflated 65%) Step #6: adding: containerd-binaries/ctr (deflated 63%) Step #6: adding: crash-da39a3ee5e6b4b0d3255bfef95601890afd80709 (stored 0%) Step #6: adding: fuzz_FuzzApply (deflated 72%) Step #6: adding: fuzz_FuzzArchiveExport (deflated 72%) Step #6: adding: fuzz_FuzzCRISandboxServer (deflated 72%) Step #6: adding: fuzz_FuzzCRIServer (deflated 72%) Step #6: adding: fuzz_FuzzCSWalk (deflated 72%) Step #6: adding: fuzz_FuzzContainerStore (deflated 72%) Step #6: adding: fuzz_FuzzContainerdImport (deflated 72%) Step #6: adding: fuzz_FuzzContentStore (deflated 72%) Step #6: adding: fuzz_FuzzContentStoreWriter (deflated 70%) Step #6: adding: fuzz_FuzzConvertManifest (deflated 70%) Step #6: adding: fuzz_FuzzDecompressStream (deflated 67%) Step #6: adding: fuzz_FuzzDiffApply (deflated 72%) Step #6: adding: fuzz_FuzzDiffCompare (deflated 72%) Step #6: adding: fuzz_FuzzExchange (deflated 72%) Step #6: adding: fuzz_FuzzFetcher (deflated 69%) Step #6: adding: fuzz_FuzzFiltersParse (deflated 70%) Step #6: adding: fuzz_FuzzImageStore (deflated 72%) Step #6: adding: fuzz_FuzzImagesCheck (deflated 72%) Step #6: adding: fuzz_FuzzImportIndex (deflated 72%) Step #6: adding: fuzz_FuzzImportIndex.dict (stored 0%) Step #6: adding: fuzz_FuzzImportIndex.options (deflated 7%) Step #6: adding: fuzz_FuzzIntegCreateContainerNoTearDown (deflated 71%) Step #6: adding: fuzz_FuzzIntegCreateContainerWithTearDown (deflated 71%) Step #6: adding: fuzz_FuzzIntegNoTearDownWithDownload (deflated 71%) Step #6: adding: fuzz_FuzzLeaseManager (deflated 72%) Step #6: adding: fuzz_FuzzLoadDefaultProfile (deflated 70%) Step #6: adding: fuzz_FuzzParseAuth (deflated 72%) Step #6: adding: fuzz_FuzzParseAuthHeader (deflated 66%) Step #6: adding: fuzz_FuzzParseHostsFile (deflated 70%) Step #6: adding: fuzz_FuzzParseProcPIDStatus (deflated 66%) Step #6: adding: fuzz_FuzzPlatformsParse (deflated 67%) Step #6: adding: fuzz_FuzzSendAndReceive (deflated 70%) Step #6: adding: fuzz_FuzzUUIDParse (deflated 72%) Step #6: adding: llvm-symbolizer (deflated 64%) Step #6: adding: slow-unit-adc83b19e793491b1c6ea0fd8b46cd9f32e592fc (stored 0%) Step #6: adding: slow-unit-df58248c414f342c81e056b40bee12d17a08bf61 (stored 0%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 324 0 0 100 324 0 1574 --:--:-- --:--:-- --:--:-- 1572 100 324 0 0 100 324 0 1421 --:--:-- --:--:-- --:--:-- 1421 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 2 719M 0 0 2 18.2M 0 99.1M 0:00:07 --:--:-- 0:00:07 98.9M 20 719M 0 0 20 144M 0 123M 0:00:05 0:00:01 0:00:04 123M 39 719M 0 0 39 282M 0 129M 0:00:05 0:00:02 0:00:03 129M 58 719M 0 0 58 419M 0 131M 0:00:05 0:00:03 0:00:02 131M 76 719M 0 0 76 552M 0 132M 0:00:05 0:00:04 0:00:01 132M 95 719M 0 0 95 687M 0 132M 0:00:05 0:00:05 --:--:-- 134M 100 719M 0 0 100 719M 0 127M 0:00:05 0:00:05 --:--:-- 128M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 741 0 0 100 741 0 2264 --:--:-- --:--:-- --:--:-- 2266 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 189 --:--:-- --:--:-- --:--:-- 190 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/containerd Finished Step #11 PUSH DONE