starting build "bf8eb08c-2f83-4529-a2a7-580c6a0a523f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 160496dfdc1e: Pulling fs layer Step #1: e2c1e6ffb55e: Pulling fs layer Step #1: 790f0b60d601: Pulling fs layer Step #1: ba5377523637: Pulling fs layer Step #1: fcf19af99e9b: Pulling fs layer Step #1: c120616e8611: Pulling fs layer Step #1: 648979ff9271: Pulling fs layer Step #1: 38b58f40b986: Pulling fs layer Step #1: 6fec27639895: Pulling fs layer Step #1: 6311c17bee61: Pulling fs layer Step #1: 63cd1cde0eec: Pulling fs layer Step #1: 1ef02760f71f: Pulling fs layer Step #1: fda5a71c8862: Pulling fs layer Step #1: 7ad2f7c615a2: Pulling fs layer Step #1: 0b07407e6342: Pulling fs layer Step #1: fbed995eca46: Pulling fs layer Step #1: 4381c7f8884c: Pulling fs layer Step #1: bd3393df7542: Pulling fs layer Step #1: f8afaf16f210: Pulling fs layer Step #1: 086216b75b6f: Pulling fs layer Step #1: ebb3d4059a93: Pulling fs layer Step #1: 1cb7b39b268b: Pulling fs layer Step #1: fd1f752e3c9f: Pulling fs layer Step #1: 6311c17bee61: Waiting Step #1: 84db406b755d: Pulling fs layer Step #1: 3968f7202bef: Pulling fs layer Step #1: 790f0b60d601: Waiting Step #1: ba5377523637: Waiting Step #1: 37c0a55501a4: Pulling fs layer Step #1: fddacf1580ff: Pulling fs layer Step #1: 3c790d5687e6: Pulling fs layer Step #1: 0fcda4deea49: Pulling fs layer Step #1: cfc1aaab3799: Pulling fs layer Step #1: 7ad2f7c615a2: Waiting Step #1: 5764b068ae0e: Pulling fs layer Step #1: 0b07407e6342: Waiting Step #1: ca6809cc8eb6: Pulling fs layer Step #1: fbed995eca46: Waiting Step #1: 4e3caf1176dc: Pulling fs layer Step #1: 4004435cf3c9: Pulling fs layer Step #1: 4381c7f8884c: Waiting Step #1: 648979ff9271: Waiting Step #1: bd3393df7542: Waiting Step #1: 63cd1cde0eec: Waiting Step #1: 37c0a55501a4: Waiting Step #1: f8afaf16f210: Waiting Step #1: 1ef02760f71f: Waiting Step #1: 086216b75b6f: Waiting Step #1: 38b58f40b986: Waiting Step #1: ebb3d4059a93: Waiting Step #1: fcf19af99e9b: Waiting Step #1: 1cb7b39b268b: Waiting Step #1: fd1f752e3c9f: Waiting Step #1: 6fec27639895: Waiting Step #1: fda5a71c8862: Waiting Step #1: c120616e8611: Waiting Step #1: 84db406b755d: Waiting Step #1: fddacf1580ff: Waiting Step #1: 3c790d5687e6: Waiting Step #1: 0fcda4deea49: Waiting Step #1: 4004435cf3c9: Waiting Step #1: 3968f7202bef: Waiting Step #1: 5764b068ae0e: Waiting Step #1: 4e3caf1176dc: Waiting Step #1: ca6809cc8eb6: Waiting Step #1: e2c1e6ffb55e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: ba5377523637: Verifying Checksum Step #1: ba5377523637: Download complete Step #1: 790f0b60d601: Verifying Checksum Step #1: 790f0b60d601: Download complete Step #1: fcf19af99e9b: Verifying Checksum Step #1: fcf19af99e9b: Download complete Step #1: 160496dfdc1e: Verifying Checksum Step #1: 160496dfdc1e: Download complete Step #1: 648979ff9271: Download complete Step #1: 38b58f40b986: Verifying Checksum Step #1: 38b58f40b986: Download complete Step #1: b549f31133a9: Pull complete Step #1: 6311c17bee61: Verifying Checksum Step #1: 6311c17bee61: Download complete Step #1: 63cd1cde0eec: Verifying Checksum Step #1: 63cd1cde0eec: Download complete Step #1: 1ef02760f71f: Verifying Checksum Step #1: 1ef02760f71f: Download complete Step #1: fda5a71c8862: Verifying Checksum Step #1: fda5a71c8862: Download complete Step #1: 7ad2f7c615a2: Download complete Step #1: 6fec27639895: Verifying Checksum Step #1: 6fec27639895: Download complete Step #1: 0b07407e6342: Download complete Step #1: fbed995eca46: Verifying Checksum Step #1: fbed995eca46: Download complete Step #1: 4381c7f8884c: Verifying Checksum Step #1: 4381c7f8884c: Download complete Step #1: bd3393df7542: Verifying Checksum Step #1: bd3393df7542: Download complete Step #1: f8afaf16f210: Verifying Checksum Step #1: f8afaf16f210: Download complete Step #1: 086216b75b6f: Download complete Step #1: ebb3d4059a93: Verifying Checksum Step #1: ebb3d4059a93: Download complete Step #1: 1cb7b39b268b: Download complete Step #1: fd1f752e3c9f: Download complete Step #1: 84db406b755d: Verifying Checksum Step #1: 84db406b755d: Download complete Step #1: 3968f7202bef: Verifying Checksum Step #1: 3968f7202bef: Download complete Step #1: c120616e8611: Verifying Checksum Step #1: c120616e8611: Download complete Step #1: 37c0a55501a4: Verifying Checksum Step #1: 37c0a55501a4: Download complete Step #1: fddacf1580ff: Verifying Checksum Step #1: fddacf1580ff: Download complete Step #1: 3c790d5687e6: Verifying Checksum Step #1: 3c790d5687e6: Download complete Step #1: 160496dfdc1e: Pull complete Step #1: 0fcda4deea49: Verifying Checksum Step #1: 0fcda4deea49: Download complete Step #1: e2c1e6ffb55e: Pull complete Step #1: cfc1aaab3799: Verifying Checksum Step #1: cfc1aaab3799: Download complete Step #1: 5764b068ae0e: Verifying Checksum Step #1: 5764b068ae0e: Download complete Step #1: 4004435cf3c9: Download complete Step #1: ca6809cc8eb6: Download complete Step #1: 790f0b60d601: Pull complete Step #1: ba5377523637: Pull complete Step #1: fcf19af99e9b: Pull complete Step #1: 4e3caf1176dc: Verifying Checksum Step #1: 4e3caf1176dc: Download complete Step #1: c120616e8611: Pull complete Step #1: 648979ff9271: Pull complete Step #1: 38b58f40b986: Pull complete Step #1: 6fec27639895: Pull complete Step #1: 6311c17bee61: Pull complete Step #1: 63cd1cde0eec: Pull complete Step #1: 1ef02760f71f: Pull complete Step #1: fda5a71c8862: Pull complete Step #1: 7ad2f7c615a2: Pull complete Step #1: 0b07407e6342: Pull complete Step #1: fbed995eca46: Pull complete Step #1: 4381c7f8884c: Pull complete Step #1: bd3393df7542: Pull complete Step #1: f8afaf16f210: Pull complete Step #1: 086216b75b6f: Pull complete Step #1: ebb3d4059a93: Pull complete Step #1: 1cb7b39b268b: Pull complete Step #1: fd1f752e3c9f: Pull complete Step #1: 84db406b755d: Pull complete Step #1: 3968f7202bef: Pull complete Step #1: 37c0a55501a4: Pull complete Step #1: fddacf1580ff: Pull complete Step #1: 3c790d5687e6: Pull complete Step #1: 0fcda4deea49: Pull complete Step #1: cfc1aaab3799: Pull complete Step #1: 5764b068ae0e: Pull complete Step #1: ca6809cc8eb6: Pull complete Step #1: 4e3caf1176dc: Pull complete Step #1: 4004435cf3c9: Pull complete Step #1: Digest: sha256:225cd83438a87e622e52d1845e40199d59a2c171c00cbb8bc5e736a33564d95d Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 0280c66864b0 Step #1: Step 2/5 : RUN git clone --depth 1 https://github.com/opencontainers/runc Step #1: ---> Running in 564319c97c17 Step #1: Cloning into 'runc'... Step #1: Removing intermediate container 564319c97c17 Step #1: ---> d3c595bac78e Step #1: Step 3/5 : RUN git clone --depth 1 https://github.com/cncf/cncf-fuzzing Step #1: ---> Running in 32b8d96d25ec Step #1: Cloning into 'cncf-fuzzing'... Step #1: Removing intermediate container 32b8d96d25ec Step #1: ---> 8f5610556918 Step #1: Step 4/5 : COPY build.sh $SRC/ Step #1: ---> 186abd8cc3d2 Step #1: Step 5/5 : WORKDIR $SRC/runc Step #1: ---> Running in 8c6e31490c08 Step #1: Removing intermediate container 8c6e31490c08 Step #1: ---> 3f5649562908 Step #1: Successfully built 3f5649562908 Step #1: Successfully tagged gcr.io/oss-fuzz/runc:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/runc Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file5ujRlN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/cncf-fuzzing/.git Step #2 - "srcmap": + GIT_DIR=/src/cncf-fuzzing Step #2 - "srcmap": + cd /src/cncf-fuzzing Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/cncf/cncf-fuzzing Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ec3111a9fe73cd8317bdde017b8e814dccbb2e6f Step #2 - "srcmap": + jq_inplace /tmp/file5ujRlN '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "ec3111a9fe73cd8317bdde017b8e814dccbb2e6f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file4fNK49 Step #2 - "srcmap": + cat /tmp/file5ujRlN Step #2 - "srcmap": + jq '."/src/cncf-fuzzing" = { type: "git", url: "https://github.com/cncf/cncf-fuzzing", rev: "ec3111a9fe73cd8317bdde017b8e814dccbb2e6f" }' Step #2 - "srcmap": + mv /tmp/file4fNK49 /tmp/file5ujRlN Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/runc/.git Step #2 - "srcmap": + GIT_DIR=/src/runc Step #2 - "srcmap": + cd /src/runc Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/opencontainers/runc Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=82bf6d1cee2a9f86f7773fcbe23b47877407620f Step #2 - "srcmap": + jq_inplace /tmp/file5ujRlN '."/src/runc" = { type: "git", url: "https://github.com/opencontainers/runc", rev: "82bf6d1cee2a9f86f7773fcbe23b47877407620f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filePb40lK Step #2 - "srcmap": + cat /tmp/file5ujRlN Step #2 - "srcmap": + jq '."/src/runc" = { type: "git", url: "https://github.com/opencontainers/runc", rev: "82bf6d1cee2a9f86f7773fcbe23b47877407620f" }' Step #2 - "srcmap": + mv /tmp/filePb40lK /tmp/file5ujRlN Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file5ujRlN Step #2 - "srcmap": + rm /tmp/file5ujRlN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/cncf-fuzzing": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/cncf/cncf-fuzzing", Step #2 - "srcmap": "rev": "ec3111a9fe73cd8317bdde017b8e814dccbb2e6f" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/runc": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/opencontainers/runc", Step #2 - "srcmap": "rev": "82bf6d1cee2a9f86f7773fcbe23b47877407620f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/runc/tests/fuzzing/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/userns: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.4 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/seccomp/libseccomp-golang v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mrunalp/fileutils v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230224173230-c95f2b4c22f2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/userns [github.com/opencontainers/runc/libcontainer/userns.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuidmap_test.go:63:3: undefined: FuzzUIDMap Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/user: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/user Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/user Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/user [github.com/opencontainers/runc/libcontainer/user.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuser_test.go:63:3: undefined: FuzzUser Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/configs: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/configs Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/configs Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/cncf-fuzzing/projects/runc/build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + go clean --modcache Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go1.22.4 (linux/amd64) Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli v1.22.16 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cyphar/filepath-securejoin v0.3.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v6 v6.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.16.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/seccomp/libseccomp-golang v0.10.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mrunalp/fileutils v0.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-quicktest/qt v1.101.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/jsimonetti/rtnetlink/v2 v2.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20230224173230-c95f2b4c22f2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/netlink v1.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/native v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r /src/runc/vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + go get github.com/AdaLogics/go-fuzz-headers Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: added github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": + export RUNC_PATH=github.com/opencontainers/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + RUNC_PATH=github.com/opencontainers/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + export RUNC_FUZZERS=/src/cncf-fuzzing/projects/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + RUNC_FUZZERS=/src/cncf-fuzzing/projects/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/opencontainers/runc/libcontainer/userns FuzzUIDMap fuzz_uid_map Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/opencontainers/runc/libcontainer/userns: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/opencontainers/runc/libcontainer/userns Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/opencontainers/runc/libcontainer/userns [github.com/opencontainers/runc/libcontainer/userns.test] Step #3 - "compile-libfuzzer-coverage-x86_64": ./fuzzuidmap_test.go:63:3: undefined: FuzzUIDMap Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Step #3 - "compile-libfuzzer-coverage-x86_64": Failed to build. Step #3 - "compile-libfuzzer-coverage-x86_64": To reproduce, run: Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_image runc Step #3 - "compile-libfuzzer-coverage-x86_64": python infra/helper.py build_fuzzers --sanitizer coverage --engine libfuzzer --architecture x86_64 runc Step #3 - "compile-libfuzzer-coverage-x86_64": ******************************************************************************** Finished Step #3 - "compile-libfuzzer-coverage-x86_64" ERROR ERROR: build step 3 "gcr.io/cloud-builders/docker" failed: step exited with non-zero status: 1