starting build "bec9f9ae-d6e5-42d8-aed0-074f983d2b5a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479" Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Sending build context to Docker daemon 5.12kB Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": latest: Pulling from oss-fuzz-base/base-builder-go Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b549f31133a9: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d4dd822bbffb: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d8fc000f412: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3361395d6e44: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 48b5b52d0b6b: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 133d1078471d: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 067b043f6c3d: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b378ee38e924: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 56cba17d63ec: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0c2c0ffee9e9: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 87afe3e74a6f: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0dcbbd7b1e2b: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 96f172c7630c: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": c11c0e8d790b: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea461ccc518a: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8464fcdf5650: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": be9c3055ce18: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 9e2aefad8bb5: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": e49cca9f06ca: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8c015615c97f: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d81dcfcb6dc: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d2ea0ce4f46f: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7f3d4930022b: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 13a21c9fae89: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 17afa181c115: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7cc08c3a1dbf: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": fd9e54733f66: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 688d1a420abf: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 73ea241ea4d8: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4c89e2ea8dbc: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 441d7463a69a: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3fa465ac5942: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 518907e5c0ad: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 326319e6c6d5: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d3c8b77e4984: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 67846ae876b5: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 44506760bc19: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f3b60835fbba: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b6443e493ed3: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f6b5eabfdab8: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea326680356e: Pulling fs layer Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3361395d6e44: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 48b5b52d0b6b: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 133d1078471d: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 067b043f6c3d: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 326319e6c6d5: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b378ee38e924: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d3c8b77e4984: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 17afa181c115: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 56cba17d63ec: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 67846ae876b5: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0c2c0ffee9e9: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 44506760bc19: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f3b60835fbba: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7cc08c3a1dbf: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": fd9e54733f66: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b6443e493ed3: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 688d1a420abf: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 87afe3e74a6f: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f6b5eabfdab8: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0dcbbd7b1e2b: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea326680356e: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 73ea241ea4d8: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 96f172c7630c: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8c015615c97f: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": c11c0e8d790b: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d81dcfcb6dc: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d2ea0ce4f46f: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea461ccc518a: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4c89e2ea8dbc: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7f3d4930022b: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8464fcdf5650: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 13a21c9fae89: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": be9c3055ce18: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 441d7463a69a: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3fa465ac5942: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 9e2aefad8bb5: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": e49cca9f06ca: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 518907e5c0ad: Waiting Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d8fc000f412: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d8fc000f412: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b549f31133a9: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b549f31133a9: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 48b5b52d0b6b: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 48b5b52d0b6b: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3361395d6e44: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3361395d6e44: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 133d1078471d: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 133d1078471d: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b378ee38e924: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b378ee38e924: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d4dd822bbffb: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d4dd822bbffb: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 56cba17d63ec: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 56cba17d63ec: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b549f31133a9: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 87afe3e74a6f: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 87afe3e74a6f: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0dcbbd7b1e2b: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0dcbbd7b1e2b: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 96f172c7630c: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 96f172c7630c: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": c11c0e8d790b: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": c11c0e8d790b: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea461ccc518a: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea461ccc518a: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0c2c0ffee9e9: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0c2c0ffee9e9: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8464fcdf5650: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8464fcdf5650: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 9e2aefad8bb5: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 9e2aefad8bb5: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": be9c3055ce18: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": be9c3055ce18: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": e49cca9f06ca: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": e49cca9f06ca: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8c015615c97f: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8c015615c97f: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d81dcfcb6dc: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d81dcfcb6dc: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d2ea0ce4f46f: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 13a21c9fae89: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7f3d4930022b: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7f3d4930022b: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 067b043f6c3d: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 067b043f6c3d: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": fd9e54733f66: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 17afa181c115: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 688d1a420abf: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 688d1a420abf: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7cc08c3a1dbf: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 73ea241ea4d8: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 73ea241ea4d8: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 441d7463a69a: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 441d7463a69a: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4c89e2ea8dbc: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4c89e2ea8dbc: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3fa465ac5942: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 518907e5c0ad: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 518907e5c0ad: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d4dd822bbffb: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 326319e6c6d5: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 326319e6c6d5: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d3c8b77e4984: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d3c8b77e4984: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 67846ae876b5: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 67846ae876b5: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d8fc000f412: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b6443e493ed3: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b6443e493ed3: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 44506760bc19: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 44506760bc19: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f3b60835fbba: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f3b60835fbba: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea326680356e: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea326680356e: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3361395d6e44: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 48b5b52d0b6b: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 133d1078471d: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f6b5eabfdab8: Verifying Checksum Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f6b5eabfdab8: Download complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 067b043f6c3d: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b378ee38e924: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 56cba17d63ec: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0c2c0ffee9e9: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 87afe3e74a6f: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0dcbbd7b1e2b: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 96f172c7630c: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": c11c0e8d790b: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea461ccc518a: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8464fcdf5650: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": be9c3055ce18: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 9e2aefad8bb5: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": e49cca9f06ca: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 8c015615c97f: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4d81dcfcb6dc: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d2ea0ce4f46f: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7f3d4930022b: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 13a21c9fae89: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 17afa181c115: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 7cc08c3a1dbf: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": fd9e54733f66: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 688d1a420abf: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 73ea241ea4d8: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 4c89e2ea8dbc: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 441d7463a69a: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 3fa465ac5942: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 518907e5c0ad: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 326319e6c6d5: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": d3c8b77e4984: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 67846ae876b5: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 44506760bc19: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f3b60835fbba: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": b6443e493ed3: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": f6b5eabfdab8: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ea326680356e: Pull complete Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Digest: sha256:62872fdd05da04604b08c8980f5e98b0e6d1bd34b37fa4aba01c118d56056359 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> 72588c21f59b Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> Running in 4688cc15735f Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Fetched 128 kB in 1s (124 kB/s) Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Reading package lists... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Reading package lists... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Building dependency tree... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Reading state information... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": gcc set to manually installed. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": libc6-dev is already the newest version (2.31-0ubuntu9.18). Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": wget is already the newest version (1.20.3-1ubuntu2.1). Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": The following packages were automatically installed and are no longer required: Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": autotools-dev libsigsegv2 m4 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Use 'apt autoremove' to remove them. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": The following additional packages will be installed: Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": shared-mime-info xdg-user-dirs Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Suggested packages: Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": duperemove seccomp Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": The following NEW packages will be installed: Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Need to get 12.2 MB of archives. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": After this operation, 49.1 MB of additional disk space will be used. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.9 [1290 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.9 [5836 B] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.10 [640 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Fetched 12.2 MB in 2s (7895 kB/s) Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libglib2.0-0:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.9_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.9) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libglib2.0-data. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.9_all.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.9) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libicu66:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libxml2:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.10_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package shared-mime-info. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking shared-mime-info (1.15-1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package xdg-user-dirs. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package liblzo2-2:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package btrfs-progs. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking btrfs-progs (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libbtrfs0:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libbtrfs-dev:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package libseccomp-dev:amd64. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Selecting previously unselected package pkg-config. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.9) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": No schema files found: doing nothing. Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up liblzo2-2:amd64 (2.10-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.9) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up btrfs-progs (5.4.1-2) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Setting up shared-mime-info (1.15-1) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Removing intermediate container 4688cc15735f Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> afa26b1632f0 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> Running in 6a2c00995164 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Cloning into 'containerd'... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Removing intermediate container 6a2c00995164 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> 3bc43ee2909f Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 4/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> Running in 833ab2de075d Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Cloning into 'instrumentation'... Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Removing intermediate container 833ab2de075d Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> 8f07edc4beab Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 5/6 : COPY build.sh $SRC/ Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> 3dad0b387830 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Step 6/6 : WORKDIR $SRC/containerd Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> Running in a3f2e5ef63e0 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Removing intermediate container a3f2e5ef63e0 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": ---> c1e2dfcd45e0 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Successfully built c1e2dfcd45e0 Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Successfully tagged gcr.io/oss-fuzz/containerd:latest Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/containerd:latest Finished Step #1 - "build-6c1cd61f-22e8-48ec-ad14-04359b5a2479" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filef8tjTL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d665541f9baa20fe5a9830608ccdec48dbd2e990 Step #2 - "srcmap": + jq_inplace /tmp/filef8tjTL '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileYln3va Step #2 - "srcmap": + cat /tmp/filef8tjTL Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "d665541f9baa20fe5a9830608ccdec48dbd2e990" }' Step #2 - "srcmap": + mv /tmp/fileYln3va /tmp/filef8tjTL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=2af24b5629859019a7201c59dda611d25d608e65 Step #2 - "srcmap": + jq_inplace /tmp/filef8tjTL '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "2af24b5629859019a7201c59dda611d25d608e65" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileEfFJ9H Step #2 - "srcmap": + cat /tmp/filef8tjTL Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "2af24b5629859019a7201c59dda611d25d608e65" }' Step #2 - "srcmap": + mv /tmp/fileEfFJ9H /tmp/filef8tjTL Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filef8tjTL Step #2 - "srcmap": + rm /tmp/filef8tjTL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "d665541f9baa20fe5a9830608ccdec48dbd2e990" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "2af24b5629859019a7201c59dda611d25d608e65" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-coverage-x86_64": + go run main.go --target_dir /src/containerd/images Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.24.0 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] Hit:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] [Waiting for headers] Hit:3 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] 0% [Waiting for headers] Hit:4 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 28% Reading package lists... 28% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 42% Reading package lists... 42% Reading package lists... 49% Reading package lists... 52% Reading package lists... 52% Reading package lists... 55% Reading package lists... 55% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 69% Reading package lists... 69% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 82% Reading package lists... 82% Reading package lists... 84% Reading package lists... 84% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 4% Reading package lists... 28% Reading package lists... 28% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 41% Reading package lists... 42% Reading package lists... 42% Reading package lists... 47% Reading package lists... 52% Reading package lists... 52% Reading package lists... 55% Reading package lists... 55% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 66% Reading package lists... 69% Reading package lists... 69% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 72% Reading package lists... 82% Reading package lists... 82% Reading package lists... 84% Reading package lists... 84% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree... 62% Building dependency tree Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.20.3-1ubuntu2.1). Step #3 - "compile-libfuzzer-coverage-x86_64": The following packages were automatically installed and are no longer required: Step #3 - "compile-libfuzzer-coverage-x86_64": autotools-dev libsigsegv2 m4 Step #3 - "compile-libfuzzer-coverage-x86_64": Use 'apt autoremove' to remove them. Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.24.4.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.24.4.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + printf 'package client\nimport _ "github.com/AdamKorcz/go-118-fuzz-build/testing"\n' Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v1.0.0-rc.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd/api v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.27.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.13.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.36.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.72.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v7 v7.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.33.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/checkpointctl v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/otelttrpc v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.18.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/vsock v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/zfs/v2 v2.0.0-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sasha-s/go-deadlock v0.3.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.60.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.38.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.62.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/imgcrypt/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.12.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/petermattis/goid v0.0.0-20240813172612-4fcff4a6cae7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.23.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.37.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk/metric v1.35.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mistifyio/go-zfs/v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containers/ocicrypt v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/auto/sdk v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.36.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stefanberger/go-pkcs11uri v0.0.0-20230803200340-78284954bff6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/smallstep/pkcs7 v0.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/automaxprocs v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20250403155104-27863c87afa6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250218202821-56aae31c358a Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.32.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.23.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.21.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer_test.go:func FuzzLoadDefaultProfile(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzz_test.go:func FuzzApply(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzz_test.go:func FuzzImportIndex(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzz_test.go:func FuzzContainerdImport(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzz_test.go:func FuzzCSWalk(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzz_test.go:func FuzzArchiveExport(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzz_test.go:func FuzzCRIServer(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzz_test.go:func FuzzDiffApply(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzz_test.go:func FuzzDiffCompare(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzz_test.go:func FuzzExchange(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/images_fuzz_test.go:func FuzzImagesCheck(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzImageStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzLeaseManager(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzContainerStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzz_test.go:func FuzzContentStore(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_test.go:func FuzzParseHostsFile(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz_test.go:func FuzzConvertManifest(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz_test.go:func FuzzFetcher(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegNoTearDownWithDownload(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerNoTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerWithTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ internal/cri/server/images/image_fuzz_test.go:func FuzzParseAuth(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=internal/cri/server/images Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/internal/cri/server/images FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer_test.go:func FuzzDecompressStream(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzz_test.go:func FuzzContentStoreWriter(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 47427, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/239) remote: Counting objects: 1% (3/239) remote: Counting objects: 2% (5/239) remote: Counting objects: 3% (8/239) remote: Counting objects: 4% (10/239) remote: Counting objects: 5% (12/239) remote: Counting objects: 6% (15/239) remote: Counting objects: 7% (17/239) remote: Counting objects: 8% (20/239) remote: Counting objects: 9% (22/239) remote: Counting objects: 10% (24/239) remote: Counting objects: 11% (27/239) remote: Counting objects: 12% (29/239) remote: Counting objects: 13% (32/239) remote: Counting objects: 14% (34/239) remote: Counting objects: 15% (36/239) remote: Counting objects: 16% (39/239) remote: Counting objects: 17% (41/239) remote: Counting objects: 18% (44/239) remote: Counting objects: 19% (46/239) remote: Counting objects: 20% (48/239) remote: Counting objects: 21% (51/239) remote: Counting objects: 22% (53/239) remote: Counting objects: 23% (55/239) remote: Counting objects: 24% (58/239) remote: Counting objects: 25% (60/239) remote: Counting objects: 26% (63/239) remote: Counting objects: 27% (65/239) remote: Counting objects: 28% (67/239) remote: Counting objects: 29% (70/239) remote: Counting objects: 30% (72/239) remote: Counting objects: 31% (75/239) remote: Counting objects: 32% (77/239) remote: Counting objects: 33% (79/239) remote: Counting objects: 34% (82/239) remote: Counting objects: 35% (84/239) remote: Counting objects: 36% (87/239) remote: Counting objects: 37% (89/239) remote: Counting objects: 38% (91/239) remote: Counting objects: 39% (94/239) remote: Counting objects: 40% (96/239) remote: Counting objects: 41% (98/239) remote: Counting objects: 42% (101/239) remote: Counting objects: 43% (103/239) remote: Counting objects: 44% (106/239) remote: Counting objects: 45% (108/239) remote: Counting objects: 46% (110/239) remote: Counting objects: 47% (113/239) remote: Counting objects: 48% (115/239) remote: Counting objects: 49% (118/239) remote: Counting objects: 50% (120/239) remote: Counting objects: 51% (122/239) remote: Counting objects: 52% (125/239) remote: Counting objects: 53% (127/239) remote: Counting objects: 54% (130/239) remote: Counting objects: 55% (132/239) remote: Counting objects: 56% (134/239) remote: Counting objects: 57% (137/239) remote: Counting objects: 58% (139/239) remote: Counting objects: 59% (142/239) remote: Counting objects: 60% (144/239) remote: Counting objects: 61% (146/239) remote: Counting objects: 62% (149/239) remote: Counting objects: 63% (151/239) remote: Counting objects: 64% (153/239) remote: Counting objects: 65% (156/239) remote: Counting objects: 66% (158/239) remote: Counting objects: 67% (161/239) remote: Counting objects: 68% (163/239) remote: Counting objects: 69% (165/239) remote: Counting objects: 70% (168/239) remote: Counting objects: 71% (170/239) remote: Counting objects: 72% (173/239) remote: Counting objects: 73% (175/239) remote: Counting objects: 74% (177/239) remote: Counting objects: 75% (180/239) remote: Counting objects: 76% (182/239) remote: Counting objects: 77% (185/239) remote: Counting objects: 78% (187/239) remote: Counting objects: 79% (189/239) remote: Counting objects: 80% (192/239) remote: Counting objects: 81% (194/239) remote: Counting objects: 82% (196/239) remote: Counting objects: 83% (199/239) remote: Counting objects: 84% (201/239) remote: Counting objects: 85% (204/239) remote: Counting objects: 86% (206/239) remote: Counting objects: 87% (208/239) remote: Counting objects: 88% (211/239) remote: Counting objects: 89% (213/239) remote: Counting objects: 90% (216/239) remote: Counting objects: 91% (218/239) remote: Counting objects: 92% (220/239) remote: Counting objects: 93% (223/239) remote: Counting objects: 94% (225/239) remote: Counting objects: 95% (228/239) remote: Counting objects: 96% (230/239) remote: Counting objects: 97% (232/239) remote: Counting objects: 98% (235/239) remote: Counting objects: 99% (237/239) remote: Counting objects: 100% (239/239) remote: Counting objects: 100% (239/239), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 0% (1/116) remote: Compressing objects: 1% (2/116) remote: Compressing objects: 2% (3/116) remote: Compressing objects: 3% (4/116) remote: Compressing objects: 4% (5/116) remote: Compressing objects: 5% (6/116) remote: Compressing objects: 6% (7/116) remote: Compressing objects: 7% (9/116) remote: Compressing objects: 8% (10/116) remote: Compressing objects: 9% (11/116) remote: Compressing objects: 10% (12/116) remote: Compressing objects: 11% (13/116) remote: Compressing objects: 12% (14/116) remote: Compressing objects: 13% (16/116) remote: Compressing objects: 14% (17/116) remote: Compressing objects: 15% (18/116) remote: Compressing objects: 16% (19/116) remote: Compressing objects: 17% (20/116) remote: Compressing objects: 18% (21/116) remote: Compressing objects: 19% (23/116) remote: Compressing objects: 20% (24/116) remote: Compressing objects: 21% (25/116) remote: Compressing objects: 22% (26/116) remote: Compressing objects: 23% (27/116) remote: Compressing objects: 24% (28/116) remote: Compressing objects: 25% (29/116) remote: Compressing objects: 26% (31/116) remote: Compressing objects: 27% (32/116) remote: Compressing objects: 28% (33/116) remote: Compressing objects: 29% (34/116) remote: Compressing objects: 30% (35/116) remote: Compressing objects: 31% (36/116) remote: Compressing objects: 32% (38/116) remote: Compressing objects: 33% (39/116) remote: Compressing objects: 34% (40/116) remote: Compressing objects: 35% (41/116) remote: Compressing objects: 36% (42/116) remote: Compressing objects: 37% (43/116) remote: Compressing objects: 38% (45/116) remote: Compressing objects: 39% (46/116) remote: Compressing objects: 40% (47/116) remote: Compressing objects: 41% (48/116) remote: Compressing objects: 42% (49/116) remote: Compressing objects: 43% (50/116) remote: Compressing objects: 44% (52/116) remote: Compressing objects: 45% (53/116) remote: Compressing objects: 46% (54/116) remote: Compressing objects: 47% (55/116) remote: Compressing objects: 48% (56/116) remote: Compressing objects: 49% (57/116) remote: Compressing objects: 50% (58/116) remote: Compressing objects: 51% (60/116) remote: Compressing objects: 52% (61/116) remote: Compressing objects: 53% (62/116) remote: Compressing objects: 54% (63/116) remote: Compressing objects: 55% (64/116) remote: Compressing objects: 56% (65/116) remote: Compressing objects: 57% (67/116) remote: Compressing objects: 58% (68/116) remote: Compressing objects: 59% (69/116) remote: Compressing objects: 60% (70/116) remote: Compressing objects: 61% (71/116) remote: Compressing objects: 62% (72/116) remote: Compressing objects: 63% (74/116) remote: Compressing objects: 64% (75/116) remote: Compressing objects: 65% (76/116) remote: Compressing objects: 66% (77/116) remote: Compressing objects: 67% (78/116) remote: Compressing objects: 68% (79/116) remote: Compressing objects: 69% (81/116) remote: Compressing objects: 70% (82/116) remote: Compressing objects: 71% (83/116) remote: Compressing objects: 72% (84/116) remote: Compressing objects: 73% (85/116) remote: Compressing objects: 74% (86/116) remote: Compressing objects: 75% (87/116) remote: Compressing objects: 76% (89/116) remote: Compressing objects: 77% (90/116) remote: Compressing objects: 78% (91/116) remote: Compressing objects: 79% (92/116) remote: Compressing objects: 80% (93/116) remote: Compressing objects: 81% (94/116) remote: Compressing objects: 82% (96/116) remote: Compressing objects: 83% (97/116) remote: Compressing objects: 84% (98/116) remote: Compressing objects: 85% (99/116) remote: Compressing objects: 86% (100/116) remote: Compressing objects: 87% (101/116) remote: Compressing objects: 88% (103/116) remote: Compressing objects: 89% (104/116) remote: Compressing objects: 90% (105/116) remote: Compressing objects: 91% (106/116) remote: Compressing objects: 92% (107/116) remote: Compressing objects: 93% (108/116) remote: Compressing objects: 94% (110/116) remote: Compressing objects: 95% (111/116) remote: Compressing objects: 96% (112/116) remote: Compressing objects: 97% (113/116) remote: Compressing objects: 98% (114/116) remote: Compressing objects: 99% (115/116) remote: Compressing objects: 100% (116/116) remote: Compressing objects: 100% (116/116), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/47427) Receiving objects: 1% (475/47427) Receiving objects: 2% (949/47427) Receiving objects: 3% (1423/47427) Receiving objects: 4% (1898/47427) Receiving objects: 5% (2372/47427) Receiving objects: 6% (2846/47427) Receiving objects: 7% (3320/47427) Receiving objects: 8% (3795/47427) Receiving objects: 9% (4269/47427) Receiving objects: 10% (4743/47427) Receiving objects: 11% (5217/47427) Receiving objects: 12% (5692/47427) Receiving objects: 13% (6166/47427) Receiving objects: 14% (6640/47427) Receiving objects: 15% (7115/47427) Receiving objects: 16% (7589/47427) Receiving objects: 17% (8063/47427) Receiving objects: 18% (8537/47427) Receiving objects: 19% (9012/47427) Receiving objects: 20% (9486/47427) Receiving objects: 21% (9960/47427) Receiving objects: 22% (10434/47427) Receiving objects: 23% (10909/47427) Receiving objects: 24% (11383/47427) Receiving objects: 25% (11857/47427) Receiving objects: 26% (12332/47427) Receiving objects: 27% (12806/47427) Receiving objects: 28% (13280/47427) Receiving objects: 29% (13754/47427) Receiving objects: 30% (14229/47427) Receiving objects: 31% (14703/47427) Receiving objects: 32% (15177/47427) Receiving objects: 33% (15651/47427) Receiving objects: 34% (16126/47427) Receiving objects: 35% (16600/47427) Receiving objects: 36% (17074/47427) Receiving objects: 37% (17548/47427) Receiving objects: 38% (18023/47427) Receiving objects: 39% (18497/47427) Receiving objects: 40% (18971/47427) Receiving objects: 41% (19446/47427) Receiving objects: 42% (19920/47427) Receiving objects: 43% (20394/47427) Receiving objects: 44% (20868/47427) Receiving objects: 45% (21343/47427) Receiving objects: 46% (21817/47427) Receiving objects: 47% (22291/47427) Receiving objects: 48% (22765/47427) Receiving objects: 49% (23240/47427) Receiving objects: 50% (23714/47427) Receiving objects: 51% (24188/47427) Receiving objects: 52% (24663/47427) Receiving objects: 53% (25137/47427) Receiving objects: 54% (25611/47427) Receiving objects: 55% (26085/47427) Receiving objects: 56% (26560/47427) Receiving objects: 57% (27034/47427) Receiving objects: 58% (27508/47427) Receiving objects: 59% (27982/47427) Receiving objects: 60% (28457/47427) Receiving objects: 61% (28931/47427) Receiving objects: 62% (29405/47427) Receiving objects: 63% (29880/47427) Receiving objects: 64% (30354/47427) Receiving objects: 65% (30828/47427) Receiving objects: 66% (31302/47427) Receiving objects: 67% (31777/47427) Receiving objects: 68% (32251/47427) Receiving objects: 69% (32725/47427) Receiving objects: 70% (33199/47427) Receiving objects: 71% (33674/47427) Receiving objects: 72% (34148/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 73% (34622/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 74% (35096/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 75% (35571/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 76% (36045/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 77% (36519/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 78% (36994/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 79% (37468/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 80% (37942/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 81% (38416/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 82% (38891/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 83% (39365/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 84% (39839/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 85% (40313/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 86% (40788/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 87% (41262/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 88% (41736/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 89% (42211/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 90% (42685/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 91% (43159/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 92% (43633/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 93% (44108/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 94% (44582/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 95% (45056/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 96% (45530/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 97% (46005/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 98% (46479/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 99% (46953/47427), 18.32 MiB | 36.64 MiB/s remote: Total 47427 (delta 172), reused 121 (delta 121), pack-reused 47188 (from 3) Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (47427/47427), 18.32 MiB | 36.64 MiB/s Receiving objects: 100% (47427/47427), 23.26 MiB | 37.45 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/31034) Resolving deltas: 1% (322/31034) Resolving deltas: 2% (623/31034) Resolving deltas: 3% (983/31034) Resolving deltas: 4% (1254/31034) Resolving deltas: 5% (1559/31034) Resolving deltas: 6% (1871/31034) Resolving deltas: 7% (2186/31034) Resolving deltas: 8% (2484/31034) Resolving deltas: 9% (2799/31034) Resolving deltas: 10% (3104/31034) Resolving deltas: 11% (3414/31034) Resolving deltas: 12% (3725/31034) Resolving deltas: 13% (4073/31034) Resolving deltas: 14% (4388/31034) Resolving deltas: 15% (4663/31034) Resolving deltas: 16% (4967/31034) Resolving deltas: 18% (5589/31034) Resolving deltas: 19% (5984/31034) Resolving deltas: 20% (6218/31034) Resolving deltas: 21% (6529/31034) Resolving deltas: 22% (6846/31034) Resolving deltas: 23% (7211/31034) Resolving deltas: 24% (7456/31034) Resolving deltas: 25% (7759/31034) Resolving deltas: 26% (8155/31034) Resolving deltas: 27% (8380/31034) Resolving deltas: 28% (8700/31034) Resolving deltas: 29% (9004/31034) Resolving deltas: 30% (9335/31034) Resolving deltas: 31% (9651/31034) Resolving deltas: 32% (9946/31034) Resolving deltas: 33% (10254/31034) Resolving deltas: 34% (10557/31034) Resolving deltas: 35% (10863/31034) Resolving deltas: 36% (11178/31034) Resolving deltas: 37% (11487/31034) Resolving deltas: 38% (11807/31034) Resolving deltas: 39% (12113/31034) Resolving deltas: 40% (12453/31034) Resolving deltas: 41% (12876/31034) Resolving deltas: 42% (13203/31034) Resolving deltas: 43% (13371/31034) Resolving deltas: 44% (13655/31034) Resolving deltas: 45% (13971/31034) Resolving deltas: 46% (14298/31034) Resolving deltas: 47% (14603/31034) Resolving deltas: 48% (14901/31034) Resolving deltas: 49% (15218/31034) Resolving deltas: 50% (15532/31034) Resolving deltas: 51% (15838/31034) Resolving deltas: 52% (16141/31034) Resolving deltas: 53% (16483/31034) Resolving deltas: 54% (16850/31034) Resolving deltas: 55% (17151/31034) Resolving deltas: 56% (17393/31034) Resolving deltas: 57% (17781/31034) Resolving deltas: 58% (18084/31034) Resolving deltas: 59% (18325/31034) Resolving deltas: 60% (18621/31034) Resolving deltas: 61% (18937/31034) Resolving deltas: 62% (19246/31034) Resolving deltas: 63% (19556/31034) Resolving deltas: 64% (19877/31034) Resolving deltas: 65% (20183/31034) Resolving deltas: 66% (20486/31034) Resolving deltas: 67% (20797/31034) Resolving deltas: 68% (21226/31034) Resolving deltas: 69% (21421/31034) Resolving deltas: 70% (21734/31034) Resolving deltas: 71% (22158/31034) Resolving deltas: 72% (22368/31034) Resolving deltas: 73% (22670/31034) Resolving deltas: 74% (23154/31034) Resolving deltas: 75% (23319/31034) Resolving deltas: 76% (23599/31034) Resolving deltas: 77% (24037/31034) Resolving deltas: 78% (24224/31034) Resolving deltas: 79% (24538/31034) Resolving deltas: 80% (24889/31034) Resolving deltas: 81% (25386/31034) Resolving deltas: 82% (25474/31034) Resolving deltas: 83% (25785/31034) Resolving deltas: 84% (26072/31034) Resolving deltas: 85% (26393/31034) Resolving deltas: 86% (26690/31034) Resolving deltas: 87% (27002/31034) Resolving deltas: 88% (27316/31034) Resolving deltas: 89% (27642/31034) Resolving deltas: 90% (27945/31034) Resolving deltas: 91% (28264/31034) Resolving deltas: 92% (28564/31034) Resolving deltas: 93% (28866/31034) Resolving deltas: 94% (29179/31034) Resolving deltas: 95% (29486/31034) Resolving deltas: 96% (29813/31034) Resolving deltas: 97% (30119/31034) Resolving deltas: 98% (30415/31034) Resolving deltas: 99% (30733/31034) Resolving deltas: 100% (31034/31034) Resolving deltas: 100% (31034/31034), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.15-2-g06833792 -X main.version=1.1.15+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=2af24b5.m -X github.com/containerd/containerd/v2/version.Revision=2af24b5629859019a7201c59dda611d25d608e65.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=2af24b5.m -X github.com/containerd/containerd/v2/version.Revision=2af24b5629859019a7201c59dda611d25d608e65.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/containerd/containerd/v2/cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/ld: /usr/bin/ld: DWARF error: invalid or unhandled FORM value: 0x25 Step #3 - "compile-libfuzzer-coverage-x86_64": /tmp/go-link-3413064443/000020.o: in function `New': Step #3 - "compile-libfuzzer-coverage-x86_64": pkcs11.cgo2.c:(.text+0x22): warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=2af24b5.m -X github.com/containerd/containerd/v2/version.Revision=2af24b5629859019a7201c59dda611d25d608e65.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": CGO_ENABLED=0 go build -o bin/containerd-shim-runc-v2 -ldflags '-X github.com/containerd/containerd/v2/version.Version=2af24b5.m -X github.com/containerd/containerd/v2/version.Revision=2af24b5629859019a7201c59dda611d25d608e65.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -extldflags "-static" -s -w' -tags "urfave_cli_no_docs osusergo netgo static_build no_grpc" ./cmd/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegNoTearDownWithDownload(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerNoTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzz_test.go:func FuzzIntegCreateContainerWithTearDown(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: d4dd822bbffb: Already exists Step #4: 4d8fc000f412: Already exists Step #4: 389e1cb2b517: Pulling fs layer Step #4: e1c5f4198d9f: Pulling fs layer Step #4: 2bf8e2a82f27: Pulling fs layer Step #4: a041ea0a7870: Pulling fs layer Step #4: 2b5e29f0623e: Pulling fs layer Step #4: 6041a58f5d29: Pulling fs layer Step #4: 9ebacd20d43d: Pulling fs layer Step #4: f79bfb061366: Pulling fs layer Step #4: 646e42d39dba: Pulling fs layer Step #4: dff4be8d2817: Pulling fs layer Step #4: 8c0f3eb76529: Pulling fs layer Step #4: 93d2418a6c21: Pulling fs layer Step #4: 18f124aab1b1: Pulling fs layer Step #4: da2ebf33d422: Pulling fs layer Step #4: 178606bb99d6: Pulling fs layer Step #4: aae63a868d37: Pulling fs layer Step #4: 6ae5d3a43a91: Pulling fs layer Step #4: 3f8afd344dd7: Pulling fs layer Step #4: a2d8114ab0b1: Pulling fs layer Step #4: 7ae2d057c63f: Pulling fs layer Step #4: 4e3ece6738ea: Pulling fs layer Step #4: 9a8170f87ad2: Pulling fs layer Step #4: 174b28ee17ef: Pulling fs layer Step #4: 6041a58f5d29: Waiting Step #4: 9ebacd20d43d: Waiting Step #4: 7ae2d057c63f: Waiting Step #4: 4e3ece6738ea: Waiting Step #4: a2d8114ab0b1: Waiting Step #4: da2ebf33d422: Waiting Step #4: f79bfb061366: Waiting Step #4: 646e42d39dba: Waiting Step #4: 178606bb99d6: Waiting Step #4: dff4be8d2817: Waiting Step #4: aae63a868d37: Waiting Step #4: 8c0f3eb76529: Waiting Step #4: 6ae5d3a43a91: Waiting Step #4: 3f8afd344dd7: Waiting Step #4: 93d2418a6c21: Waiting Step #4: 18f124aab1b1: Waiting Step #4: 174b28ee17ef: Waiting Step #4: 2b5e29f0623e: Waiting Step #4: a041ea0a7870: Waiting Step #4: 9a8170f87ad2: Waiting Step #4: 2bf8e2a82f27: Verifying Checksum Step #4: 2bf8e2a82f27: Download complete Step #4: 389e1cb2b517: Verifying Checksum Step #4: 389e1cb2b517: Download complete Step #4: e1c5f4198d9f: Verifying Checksum Step #4: e1c5f4198d9f: Download complete Step #4: 2b5e29f0623e: Verifying Checksum Step #4: 2b5e29f0623e: Download complete Step #4: 389e1cb2b517: Pull complete Step #4: a041ea0a7870: Verifying Checksum Step #4: a041ea0a7870: Download complete Step #4: 9ebacd20d43d: Verifying Checksum Step #4: 9ebacd20d43d: Download complete Step #4: f79bfb061366: Verifying Checksum Step #4: f79bfb061366: Download complete Step #4: e1c5f4198d9f: Pull complete Step #4: 646e42d39dba: Verifying Checksum Step #4: 646e42d39dba: Download complete Step #4: 2bf8e2a82f27: Pull complete Step #4: 8c0f3eb76529: Verifying Checksum Step #4: 8c0f3eb76529: Download complete Step #4: 6041a58f5d29: Verifying Checksum Step #4: 6041a58f5d29: Download complete Step #4: a041ea0a7870: Pull complete Step #4: 93d2418a6c21: Verifying Checksum Step #4: 93d2418a6c21: Download complete Step #4: 18f124aab1b1: Verifying Checksum Step #4: 18f124aab1b1: Download complete Step #4: 2b5e29f0623e: Pull complete Step #4: 178606bb99d6: Verifying Checksum Step #4: 178606bb99d6: Download complete Step #4: dff4be8d2817: Verifying Checksum Step #4: dff4be8d2817: Download complete Step #4: da2ebf33d422: Verifying Checksum Step #4: da2ebf33d422: Download complete Step #4: 6ae5d3a43a91: Verifying Checksum Step #4: 6ae5d3a43a91: Download complete Step #4: 3f8afd344dd7: Verifying Checksum Step #4: a2d8114ab0b1: Verifying Checksum Step #4: a2d8114ab0b1: Download complete Step #4: 4e3ece6738ea: Verifying Checksum Step #4: 4e3ece6738ea: Download complete Step #4: 7ae2d057c63f: Verifying Checksum Step #4: 7ae2d057c63f: Download complete Step #4: 9a8170f87ad2: Download complete Step #4: aae63a868d37: Verifying Checksum Step #4: aae63a868d37: Download complete Step #4: 174b28ee17ef: Verifying Checksum Step #4: 174b28ee17ef: Download complete Step #4: 6041a58f5d29: Pull complete Step #4: 9ebacd20d43d: Pull complete Step #4: f79bfb061366: Pull complete Step #4: 646e42d39dba: Pull complete Step #4: dff4be8d2817: Pull complete Step #4: 8c0f3eb76529: Pull complete Step #4: 93d2418a6c21: Pull complete Step #4: 18f124aab1b1: Pull complete Step #4: da2ebf33d422: Pull complete Step #4: 178606bb99d6: Pull complete Step #4: aae63a868d37: Pull complete Step #4: 6ae5d3a43a91: Pull complete Step #4: 3f8afd344dd7: Pull complete Step #4: a2d8114ab0b1: Pull complete Step #4: 7ae2d057c63f: Pull complete Step #4: 4e3ece6738ea: Pull complete Step #4: 9a8170f87ad2: Pull complete Step #4: 174b28ee17ef: Pull complete Step #4: Digest: sha256:cc29b759bfedcdd8f62c66b84ca55b12b19250479d47d0eb6b8838ba1be4b806 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzCSWalk Step #5: Running go target fuzz_FuzzExchange Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContentStore Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: Running go target fuzz_FuzzArchiveExport Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: Running go target fuzz_FuzzConvertManifest Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: 2025/06/17 06:46:43 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: Running go target fuzz_FuzzParseAuth Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: Running go target fuzz_FuzzFiltersParse Step #5: Running go target fuzz_FuzzFetcher Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzLeaseManager Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzApply Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffCompare Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffApply Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImportIndex Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2025/06/17 06:46:48 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: Running go target fuzz_FuzzImageStore Step #5: Running go target fuzz_FuzzCRIServer Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImagesCheck Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerStore Step #5: Running go target fuzz_FuzzDecompressStream Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerdImport Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2025/06/17 06:46:48 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2025/06/17 06:46:48 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.cpu.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: 2025/06/17 06:46:48 Cannot open profile file at "/workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof": open /workspace/out/libfuzzer-coverage-x86_64/dumps/*.perf.heap.prof: no such file or directory Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/3 files][ 0.0 B/949.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/3 files][464.6 KiB/949.4 KiB] 48% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/3 files][464.6 KiB/949.4 KiB] 48% Done / [1/3 files][484.9 KiB/949.4 KiB] 51% Done / [2/3 files][949.4 KiB/949.4 KiB] 99% Done / [3/3 files][949.4 KiB/949.4 KiB] 100% Done Step #7: Operation completed over 3 objects/949.4 KiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [0/29 files][ 0.0 B/ 42.3 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.7 KiB/ 42.3 KiB] 6% Done / [0/29 files][ 2.7 KiB/ 42.3 KiB] 6% Done / [0/29 files][ 2.7 KiB/ 42.3 KiB] 6% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.7 KiB/ 42.3 KiB] 6% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [0/29 files][ 2.7 KiB/ 42.3 KiB] 6% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.5 KiB/ 42.3 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.5 KiB/ 42.3 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.5 KiB/ 42.3 KiB] 8% Done / [0/29 files][ 3.5 KiB/ 42.3 KiB] 8% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [0/29 files][ 3.5 KiB/ 42.3 KiB] 8% Done / [0/29 files][ 4.8 KiB/ 42.3 KiB] 11% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: / [0/29 files][ 4.8 KiB/ 42.3 KiB] 11% Done / [0/29 files][ 4.8 KiB/ 42.3 KiB] 11% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [0/29 files][ 7.4 KiB/ 42.3 KiB] 17% Done / [1/29 files][ 7.4 KiB/ 42.3 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [1/29 files][ 8.2 KiB/ 42.3 KiB] 19% Done / [1/29 files][ 8.2 KiB/ 42.3 KiB] 19% Done / [1/29 files][ 8.2 KiB/ 42.3 KiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [1/29 files][ 8.2 KiB/ 42.3 KiB] 19% Done / [1/29 files][ 8.2 KiB/ 42.3 KiB] 19% Done / [2/29 files][ 12.6 KiB/ 42.3 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [2/29 files][ 12.6 KiB/ 42.3 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [2/29 files][ 12.6 KiB/ 42.3 KiB] 29% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: / [2/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [2/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done / [3/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done / [4/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done / [5/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done / [6/29 files][ 13.4 KiB/ 42.3 KiB] 31% Done / [7/29 files][ 19.7 KiB/ 42.3 KiB] 46% Done / [8/29 files][ 21.5 KiB/ 42.3 KiB] 50% Done / [9/29 files][ 21.5 KiB/ 42.3 KiB] 50% Done / [10/29 files][ 21.5 KiB/ 42.3 KiB] 50% Done / [11/29 files][ 22.3 KiB/ 42.3 KiB] 52% Done / [12/29 files][ 30.1 KiB/ 42.3 KiB] 71% Done / [13/29 files][ 30.8 KiB/ 42.3 KiB] 72% Done / [14/29 files][ 38.5 KiB/ 42.3 KiB] 91% Done / [15/29 files][ 38.5 KiB/ 42.3 KiB] 91% Done / [16/29 files][ 38.5 KiB/ 42.3 KiB] 91% Done / [17/29 files][ 39.3 KiB/ 42.3 KiB] 92% Done / [18/29 files][ 39.3 KiB/ 42.3 KiB] 92% Done / [19/29 files][ 39.3 KiB/ 42.3 KiB] 92% Done / [20/29 files][ 39.3 KiB/ 42.3 KiB] 92% Done / [21/29 files][ 39.3 KiB/ 42.3 KiB] 92% Done / [22/29 files][ 40.7 KiB/ 42.3 KiB] 96% Done / [23/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [24/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [25/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [26/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [27/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [28/29 files][ 42.3 KiB/ 42.3 KiB] 99% Done / [29/29 files][ 42.3 KiB/ 42.3 KiB] 100% Done Step #9: Operation completed over 29 objects/42.3 KiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 7.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 0.0 B/ 7.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 68.0 B/ 7.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 68.0 B/ 7.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [0/28 files][ 68.0 B/ 7.1 KiB] 0% Done / [1/28 files][ 68.0 B/ 7.1 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: / [1/28 files][ 102.0 B/ 7.1 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: / [1/28 files][ 102.0 B/ 7.1 KiB] 1% Done / [2/28 files][ 136.0 B/ 7.1 KiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [2/28 files][ 171.0 B/ 7.1 KiB] 2% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [2/28 files][ 171.0 B/ 7.1 KiB] 2% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [2/28 files][ 171.0 B/ 7.1 KiB] 2% Done / [3/28 files][ 240.0 B/ 7.1 KiB] 3% Done / [4/28 files][ 240.0 B/ 7.1 KiB] 3% Done / [5/28 files][ 274.0 B/ 7.1 KiB] 3% Done / [6/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: / [6/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done / [7/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done / [8/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: / [8/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: / [8/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done / [9/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done / [10/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 1.3 KiB/ 7.1 KiB] 17% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.0 KiB/ 7.1 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.1 KiB/ 7.1 KiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.1 KiB/ 7.1 KiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.1 KiB/ 7.1 KiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [10/28 files][ 3.2 KiB/ 7.1 KiB] 44% Done / [11/28 files][ 3.2 KiB/ 7.1 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: / [11/28 files][ 3.2 KiB/ 7.1 KiB] 45% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [11/28 files][ 3.2 KiB/ 7.1 KiB] 45% Done / [12/28 files][ 5.1 KiB/ 7.1 KiB] 71% Done / [13/28 files][ 5.1 KiB/ 7.1 KiB] 71% Done / [14/28 files][ 5.1 KiB/ 7.1 KiB] 71% Done / [15/28 files][ 5.1 KiB/ 7.1 KiB] 71% Done - - [16/28 files][ 5.7 KiB/ 7.1 KiB] 79% Done - [17/28 files][ 6.9 KiB/ 7.1 KiB] 96% Done - [18/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [19/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [20/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [21/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [22/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [23/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [24/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [25/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [26/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [27/28 files][ 7.1 KiB/ 7.1 KiB] 99% Done - [28/28 files][ 7.1 KiB/ 7.1 KiB] 100% Done Step #11: Operation completed over 28 objects/7.1 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1622 --:--:-- --:--:-- --:--:-- 1630 Finished Step #13 PUSH DONE