starting build "e831dede-edda-4f11-8501-3a6406c0c6dd" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: b549f31133a9: Pulling fs layer Step #1: 51df0d6876cd: Pulling fs layer Step #1: 38da3118a46e: Pulling fs layer Step #1: ec67c84a6d76: Pulling fs layer Step #1: 8bb7dd1116ca: Pulling fs layer Step #1: 1fb4fb3d2b01: Pulling fs layer Step #1: a7d3a0578149: Pulling fs layer Step #1: 23e3013e5b98: Pulling fs layer Step #1: 50e1ee57936a: Pulling fs layer Step #1: b46b6cdbb6f2: Pulling fs layer Step #1: c0d18e8fb1fa: Pulling fs layer Step #1: 29a663a40ba4: Pulling fs layer Step #1: d57e2535d3c0: Pulling fs layer Step #1: e530a9eecf2b: Pulling fs layer Step #1: 4f27abcdaf5d: Pulling fs layer Step #1: 81adce140048: Pulling fs layer Step #1: 1eaaa1542342: Pulling fs layer Step #1: 6becd2001539: Pulling fs layer Step #1: 22d4835417b0: Pulling fs layer Step #1: 601a9cbfd137: Pulling fs layer Step #1: 972df7da24e8: Pulling fs layer Step #1: 535ecd0613d1: Pulling fs layer Step #1: 16949380c6e4: Pulling fs layer Step #1: da4104990ff0: Pulling fs layer Step #1: ec67c84a6d76: Waiting Step #1: c19b7fe83e8a: Pulling fs layer Step #1: 3c6277aa8e2b: Pulling fs layer Step #1: bcf869ca811e: Pulling fs layer Step #1: 8bb7dd1116ca: Waiting Step #1: 4a49dc7a9851: Pulling fs layer Step #1: 1fb4fb3d2b01: Waiting Step #1: de9ad109123c: Pulling fs layer Step #1: d74dccfeea37: Pulling fs layer Step #1: 9650ce23f886: Pulling fs layer Step #1: a7d3a0578149: Waiting Step #1: eaeb815cd75a: Pulling fs layer Step #1: 23e3013e5b98: Waiting Step #1: 3ccdc7b565ee: Pulling fs layer Step #1: b46b6cdbb6f2: Waiting Step #1: c0d18e8fb1fa: Waiting Step #1: 50e1ee57936a: Waiting Step #1: 11c03f65d6c1: Pulling fs layer Step #1: e6ee04fb6b22: Pulling fs layer Step #1: 972df7da24e8: Waiting Step #1: ec9eb7fda120: Pulling fs layer Step #1: 29a663a40ba4: Waiting Step #1: 92c5a6b4f98c: Pulling fs layer Step #1: c19b7fe83e8a: Waiting Step #1: 535ecd0613d1: Waiting Step #1: 3c6277aa8e2b: Waiting Step #1: d57e2535d3c0: Waiting Step #1: 16949380c6e4: Waiting Step #1: da4104990ff0: Waiting Step #1: bcf869ca811e: Waiting Step #1: 6becd2001539: Waiting Step #1: 3ccdc7b565ee: Waiting Step #1: 11c03f65d6c1: Waiting Step #1: e6ee04fb6b22: Waiting Step #1: e530a9eecf2b: Waiting Step #1: 601a9cbfd137: Waiting Step #1: de9ad109123c: Waiting Step #1: 9650ce23f886: Waiting Step #1: 4f27abcdaf5d: Waiting Step #1: eaeb815cd75a: Waiting Step #1: 1eaaa1542342: Waiting Step #1: 81adce140048: Waiting Step #1: 92c5a6b4f98c: Waiting Step #1: d74dccfeea37: Waiting Step #1: ec9eb7fda120: Waiting Step #1: 38da3118a46e: Verifying Checksum Step #1: 38da3118a46e: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 8bb7dd1116ca: Verifying Checksum Step #1: 8bb7dd1116ca: Download complete Step #1: ec67c84a6d76: Verifying Checksum Step #1: ec67c84a6d76: Download complete Step #1: 1fb4fb3d2b01: Verifying Checksum Step #1: 1fb4fb3d2b01: Download complete Step #1: 23e3013e5b98: Download complete Step #1: 50e1ee57936a: Download complete Step #1: 51df0d6876cd: Verifying Checksum Step #1: 51df0d6876cd: Download complete Step #1: b549f31133a9: Pull complete Step #1: c0d18e8fb1fa: Verifying Checksum Step #1: c0d18e8fb1fa: Download complete Step #1: 29a663a40ba4: Verifying Checksum Step #1: 29a663a40ba4: Download complete Step #1: d57e2535d3c0: Download complete Step #1: e530a9eecf2b: Verifying Checksum Step #1: e530a9eecf2b: Download complete Step #1: 4f27abcdaf5d: Verifying Checksum Step #1: 4f27abcdaf5d: Download complete Step #1: b46b6cdbb6f2: Verifying Checksum Step #1: 81adce140048: Verifying Checksum Step #1: 81adce140048: Download complete Step #1: 6becd2001539: Verifying Checksum Step #1: 6becd2001539: Download complete Step #1: 1eaaa1542342: Verifying Checksum Step #1: 1eaaa1542342: Download complete Step #1: 22d4835417b0: Download complete Step #1: 601a9cbfd137: Verifying Checksum Step #1: 601a9cbfd137: Download complete Step #1: 972df7da24e8: Verifying Checksum Step #1: 972df7da24e8: Download complete Step #1: 535ecd0613d1: Download complete Step #1: a7d3a0578149: Verifying Checksum Step #1: a7d3a0578149: Download complete Step #1: c19b7fe83e8a: Verifying Checksum Step #1: c19b7fe83e8a: Download complete Step #1: 16949380c6e4: Verifying Checksum Step #1: 16949380c6e4: Download complete Step #1: da4104990ff0: Verifying Checksum Step #1: da4104990ff0: Download complete Step #1: 3c6277aa8e2b: Download complete Step #1: bcf869ca811e: Verifying Checksum Step #1: bcf869ca811e: Download complete Step #1: 4a49dc7a9851: Verifying Checksum Step #1: 4a49dc7a9851: Download complete Step #1: de9ad109123c: Verifying Checksum Step #1: de9ad109123c: Download complete Step #1: 9650ce23f886: Download complete Step #1: d74dccfeea37: Verifying Checksum Step #1: d74dccfeea37: Download complete Step #1: 3ccdc7b565ee: Verifying Checksum Step #1: 3ccdc7b565ee: Download complete Step #1: eaeb815cd75a: Download complete Step #1: e6ee04fb6b22: Download complete Step #1: 11c03f65d6c1: Verifying Checksum Step #1: 11c03f65d6c1: Download complete Step #1: 92c5a6b4f98c: Verifying Checksum Step #1: 92c5a6b4f98c: Download complete Step #1: 51df0d6876cd: Pull complete Step #1: 38da3118a46e: Pull complete Step #1: ec67c84a6d76: Pull complete Step #1: ec9eb7fda120: Verifying Checksum Step #1: ec9eb7fda120: Download complete Step #1: 8bb7dd1116ca: Pull complete Step #1: 1fb4fb3d2b01: Pull complete Step #1: a7d3a0578149: Pull complete Step #1: 23e3013e5b98: Pull complete Step #1: 50e1ee57936a: Pull complete Step #1: b46b6cdbb6f2: Pull complete Step #1: c0d18e8fb1fa: Pull complete Step #1: 29a663a40ba4: Pull complete Step #1: d57e2535d3c0: Pull complete Step #1: e530a9eecf2b: Pull complete Step #1: 4f27abcdaf5d: Pull complete Step #1: 81adce140048: Pull complete Step #1: 1eaaa1542342: Pull complete Step #1: 6becd2001539: Pull complete Step #1: 22d4835417b0: Pull complete Step #1: 601a9cbfd137: Pull complete Step #1: 972df7da24e8: Pull complete Step #1: 535ecd0613d1: Pull complete Step #1: 16949380c6e4: Pull complete Step #1: da4104990ff0: Pull complete Step #1: c19b7fe83e8a: Pull complete Step #1: 3c6277aa8e2b: Pull complete Step #1: bcf869ca811e: Pull complete Step #1: 4a49dc7a9851: Pull complete Step #1: de9ad109123c: Pull complete Step #1: d74dccfeea37: Pull complete Step #1: 9650ce23f886: Pull complete Step #1: eaeb815cd75a: Pull complete Step #1: 3ccdc7b565ee: Pull complete Step #1: 11c03f65d6c1: Pull complete Step #1: e6ee04fb6b22: Pull complete Step #1: ec9eb7fda120: Pull complete Step #1: 92c5a6b4f98c: Pull complete Step #1: Digest: sha256:62f10f6b26d6227806d82477b0bf67b00ae52887368a9fa25648006152af5ef8 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> 565213b65e20 Step #1: Step 2/6 : RUN apt-get update && apt-get install -y btrfs-progs libc-dev pkg-config libseccomp-dev gcc wget libbtrfs-dev Step #1: ---> Running in 0ae1ba37598c Step #1: Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (225 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: gcc is already the newest version (4:9.3.0-1ubuntu2). Step #1: gcc set to manually installed. Step #1: libc6-dev is already the newest version (2.31-0ubuntu9.16). Step #1: wget is already the newest version (1.20.3-1ubuntu2.1). Step #1: The following additional packages will be installed: Step #1: libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 liblzo2-2 libxml2 Step #1: shared-mime-info xdg-user-dirs Step #1: Suggested packages: Step #1: duperemove seccomp Step #1: The following NEW packages will be installed: Step #1: btrfs-progs libbtrfs-dev libbtrfs0 libglib2.0-0 libglib2.0-data libicu66 Step #1: liblzo2-2 libseccomp-dev libxml2 pkg-config shared-mime-info xdg-user-dirs Step #1: 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 12.2 MB of archives. Step #1: After this operation, 49.1 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-0 amd64 2.64.6-1~ubuntu20.04.8 [1289 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libglib2.0-data all 2.64.6-1~ubuntu20.04.8 [5848 B] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 shared-mime-info amd64 1.15-1 [430 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 xdg-user-dirs amd64 0.17-2ubuntu1 [48.3 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 liblzo2-2 amd64 2.10-2 [50.8 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 btrfs-progs amd64 5.4.1-2 [654 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs0 amd64 5.4.1-2 [175 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libbtrfs-dev amd64 5.4.1-2 [227 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libseccomp-dev amd64 2.5.1-1ubuntu1~20.04.2 [83.6 kB] Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal/main amd64 pkg-config amd64 0.29.1-0ubuntu4 [45.5 kB] Step #1: debconf: delaying package configuration, since apt-utils is not installed Step #1: Fetched 12.2 MB in 0s (25.6 MB/s) Step #1: Selecting previously unselected package libglib2.0-0:amd64. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17393 files and directories currently installed.) Step #1: Preparing to unpack .../00-libglib2.0-0_2.64.6-1~ubuntu20.04.8_amd64.deb ... Step #1: Unpacking libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libglib2.0-data. Step #1: Preparing to unpack .../01-libglib2.0-data_2.64.6-1~ubuntu20.04.8_all.deb ... Step #1: Unpacking libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Selecting previously unselected package libicu66:amd64. Step #1: Preparing to unpack .../02-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Selecting previously unselected package libxml2:amd64. Step #1: Preparing to unpack .../03-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ... Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Selecting previously unselected package shared-mime-info. Step #1: Preparing to unpack .../04-shared-mime-info_1.15-1_amd64.deb ... Step #1: Unpacking shared-mime-info (1.15-1) ... Step #1: Selecting previously unselected package xdg-user-dirs. Step #1: Preparing to unpack .../05-xdg-user-dirs_0.17-2ubuntu1_amd64.deb ... Step #1: Unpacking xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Selecting previously unselected package liblzo2-2:amd64. Step #1: Preparing to unpack .../06-liblzo2-2_2.10-2_amd64.deb ... Step #1: Unpacking liblzo2-2:amd64 (2.10-2) ... Step #1: Selecting previously unselected package btrfs-progs. Step #1: Preparing to unpack .../07-btrfs-progs_5.4.1-2_amd64.deb ... Step #1: Unpacking btrfs-progs (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs0:amd64. Step #1: Preparing to unpack .../08-libbtrfs0_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs0:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libbtrfs-dev:amd64. Step #1: Preparing to unpack .../09-libbtrfs-dev_5.4.1-2_amd64.deb ... Step #1: Unpacking libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Selecting previously unselected package libseccomp-dev:amd64. Step #1: Preparing to unpack .../10-libseccomp-dev_2.5.1-1ubuntu1~20.04.2_amd64.deb ... Step #1: Unpacking libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Selecting previously unselected package pkg-config. Step #1: Preparing to unpack .../11-pkg-config_0.29.1-0ubuntu4_amd64.deb ... Step #1: Unpacking pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libseccomp-dev:amd64 (2.5.1-1ubuntu1~20.04.2) ... Step #1: Setting up xdg-user-dirs (0.17-2ubuntu1) ... Step #1: Setting up libglib2.0-0:amd64 (2.64.6-1~ubuntu20.04.8) ... Step #1: No schema files found: doing nothing. Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1: Setting up liblzo2-2:amd64 (2.10-2) ... Step #1: Setting up libbtrfs0:amd64 (5.4.1-2) ... Step #1: Setting up libglib2.0-data (2.64.6-1~ubuntu20.04.8) ... Step #1: Setting up pkg-config (0.29.1-0ubuntu4) ... Step #1: Setting up libbtrfs-dev:amd64 (5.4.1-2) ... Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ... Step #1: Setting up btrfs-progs (5.4.1-2) ... Step #1: Setting up shared-mime-info (1.15-1) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 0ae1ba37598c Step #1: ---> e38b1e1713de Step #1: Step 3/6 : RUN git clone --depth 1 https://github.com/containerd/containerd Step #1: ---> Running in ec956427b540 Step #1: Cloning into 'containerd'... Step #1: Removing intermediate container ec956427b540 Step #1: ---> 43b04ce84967 Step #1: Step 4/6 : RUN git clone --depth=1 https://github.com/AdamKorcz/instrumentation Step #1: ---> Running in 716b4b617dd3 Step #1: Cloning into 'instrumentation'... Step #1: Removing intermediate container 716b4b617dd3 Step #1: ---> 08a230f806c2 Step #1: Step 5/6 : COPY build.sh $SRC/ Step #1: ---> d00341290339 Step #1: Step 6/6 : WORKDIR $SRC/containerd Step #1: ---> Running in de9892d4317b Step #1: Removing intermediate container de9892d4317b Step #1: ---> 1e9f2815882a Step #1: Successfully built 1e9f2815882a Step #1: Successfully tagged gcr.io/oss-fuzz/containerd:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/containerd Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileV9Uq0N Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/instrumentation/.git Step #2 - "srcmap": + GIT_DIR=/src/instrumentation Step #2 - "srcmap": + cd /src/instrumentation Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AdamKorcz/instrumentation Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a0052d5b1e2db77ee978890722212230fe86c910 Step #2 - "srcmap": + jq_inplace /tmp/fileV9Uq0N '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "a0052d5b1e2db77ee978890722212230fe86c910" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file4Eckac Step #2 - "srcmap": + cat /tmp/fileV9Uq0N Step #2 - "srcmap": + jq '."/src/instrumentation" = { type: "git", url: "https://github.com/AdamKorcz/instrumentation", rev: "a0052d5b1e2db77ee978890722212230fe86c910" }' Step #2 - "srcmap": + mv /tmp/file4Eckac /tmp/fileV9Uq0N Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/containerd/.git Step #2 - "srcmap": + GIT_DIR=/src/containerd Step #2 - "srcmap": + cd /src/containerd Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/containerd/containerd Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=480e85de2d384b79c62f3e4d33afa9d8017c1b39 Step #2 - "srcmap": + jq_inplace /tmp/fileV9Uq0N '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "480e85de2d384b79c62f3e4d33afa9d8017c1b39" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileNgIdDI Step #2 - "srcmap": + cat /tmp/fileV9Uq0N Step #2 - "srcmap": + jq '."/src/containerd" = { type: "git", url: "https://github.com/containerd/containerd", rev: "480e85de2d384b79c62f3e4d33afa9d8017c1b39" }' Step #2 - "srcmap": + mv /tmp/fileNgIdDI /tmp/fileV9Uq0N Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileV9Uq0N Step #2 - "srcmap": + rm /tmp/fileV9Uq0N Step #2 - "srcmap": { Step #2 - "srcmap": "/src/instrumentation": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AdamKorcz/instrumentation", Step #2 - "srcmap": "rev": "a0052d5b1e2db77ee978890722212230fe86c910" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/containerd": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/containerd/containerd", Step #2 - "srcmap": "rev": "480e85de2d384b79c62f3e4d33afa9d8017c1b39" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ -lresolv Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + IFS=' Step #3 - "compile-libfuzzer-coverage-x86_64": ' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/instrumentation Step #3 - "compile-libfuzzer-coverage-x86_64": + go run main.go --target_dir /src/containerd/images Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.17.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.14.0 Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": lstat /src/containerd/images: no such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get update Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Connecting to security.ubuntu.com (185.125.190.83)] Hit:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Connecting to security.ubuntu.com (185.125.190.83)] Hit:3 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Waiting for headers] 0% [Waiting for headers] Hit:4 http://security.ubuntu.com/ubuntu focal-security InRelease Step #3 - "compile-libfuzzer-coverage-x86_64": 0% [Working] 0% [Working] 0% [Working] 20% [Working] Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 30% Reading package lists... 30% Reading package lists... 33% Reading package lists... 43% Reading package lists... 43% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 54% Reading package lists... 54% Reading package lists... 57% Reading package lists... 57% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 70% Reading package lists... 70% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 82% Reading package lists... 82% Reading package lists... 83% Reading package lists... 84% Reading package lists... 84% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": + apt-get install -y wget Step #3 - "compile-libfuzzer-coverage-x86_64": Reading package lists... 0% Reading package lists... 0% Reading package lists... 0% Reading package lists... 2% Reading package lists... 2% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 5% Reading package lists... 30% Reading package lists... 30% Reading package lists... 34% Reading package lists... 43% Reading package lists... 43% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 44% Reading package lists... 54% Reading package lists... 54% Reading package lists... 57% Reading package lists... 57% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 67% Reading package lists... 70% Reading package lists... 70% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 73% Reading package lists... 82% Reading package lists... 82% Reading package lists... 84% Reading package lists... 84% Reading package lists... 84% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 94% Reading package lists... 97% Reading package lists... 97% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... 99% Reading package lists... Done Step #3 - "compile-libfuzzer-coverage-x86_64": Building dependency tree... 0% Building dependency tree... 0% Building dependency tree... 50% Building dependency tree... 50% Building dependency tree Step #3 - "compile-libfuzzer-coverage-x86_64": Reading state information... 0% Reading state information... 0% Reading state information... Done Step #3 - "compile-libfuzzer-coverage-x86_64": wget is already the newest version (1.20.3-1ubuntu2.1). Step #3 - "compile-libfuzzer-coverage-x86_64": 0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://go.dev/dl/go1.23.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir temp-go Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -rf /root/.go/CONTRIBUTING.md /root/.go/LICENSE /root/.go/PATENTS /root/.go/README.md /root/.go/SECURITY.md /root/.go/VERSION /root/.go/api /root/.go/bin /root/.go/codereview.cfg /root/.go/doc /root/.go/go.env /root/.go/lib /root/.go/misc /root/.go/pkg /root/.go/src /root/.go/test Step #3 - "compile-libfuzzer-coverage-x86_64": + tar -C temp-go/ -xzf go1.23.3.linux-amd64.tar.gz Step #3 - "compile-libfuzzer-coverage-x86_64": + mv temp-go/go/CONTRIBUTING.md temp-go/go/LICENSE temp-go/go/PATENTS temp-go/go/README.md temp-go/go/SECURITY.md temp-go/go/VERSION temp-go/go/api temp-go/go/bin temp-go/go/codereview.cfg temp-go/go/doc temp-go/go/go.env temp-go/go/lib temp-go/go/misc temp-go/go/pkg temp-go/go/src temp-go/go/test /root/.go/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + go mod tidy Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/cgroups/v3 v3.0.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/log v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/go-digest v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/image-spec v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/urfave/cli/v2 v2.27.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/containerd/api v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/platforms v1.0.0-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdamKorcz/go-118-fuzz-build v0.0.0-20231105174938-2b5cbb29f3e2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/console v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/typeurl/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/go-winio v0.6.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/plugin v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading dario.cat/mergo v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/Microsoft/hcsshim v0.12.9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/protobuf v1.35.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/grpc v1.67.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-spec v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pelletier/go-toml/v2 v2.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/errdefs/pkg v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-units v0.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/AdaLogics/go-fuzz-headers v0.0.0-20240806141605-e8a1dd7889d6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sys v0.27.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/fifo v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-runc v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/ttrpc v1.2.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/go-cni v1.1.10 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/sync v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-metrics v0.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/testify v1.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/docker/go-events v0.0.0-20190806004212-e31b211e4f1c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/intel/goresctrl v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/signal v0.7.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/distribution/reference v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/cri-api v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/go-cmp v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/userns v0.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/coreos/go-systemd/v22 v22.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/continuity v0.4.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/otelttrpc v0.0.0-20240305015340-ea5083fda723 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/user v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/vsock v1.2.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/sirupsen/logrus v1.9.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/mountinfo v0.7.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/selinux v1.11.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/sdk v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_golang v1.20.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.56.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/uuid v1.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.etcd.io/bbolt v1.3.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/zfs/v2 v2.0.0-rc.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gogo/protobuf v1.3.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/klauspost/compress v1.17.11 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/locker v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/component-base v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/klog/v2 v2.130.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/rpc v0.0.0-20241021214115-324edc3d5d38 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/plugins v1.5.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/symlink v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/sys/sequential v0.6.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apimachinery v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cilium/ebpf v0.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/godbus/dbus/v5 v5.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containernetworking/cni v1.2.3 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/client-go v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kubelet v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/procfs v0.15.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/checkpointctl v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/checkpoint-restore/go-criu/v7 v7.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/imgcrypt/v2 v2.0.0-rc.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fsnotify/fsnotify v1.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netlink v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.56.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/trace v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mdlayher/socket v0.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/net v0.30.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/opencontainers/runtime-tools v0.9.1-0.20221107090550-2e043c6bd626 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/mod v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/yaml v1.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading tags.cncf.io/container-device-interface/specs-go v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/go-grpc-middleware/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/client_model v0.6.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/otel/metric v1.31.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cpuguy83/go-md2man/v2 v2.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xrash/smetrics v0.0.0-20240521201337-686a1a2994c1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/nri v0.8.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/beorn7/perks v1.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cespare/xxhash/v2 v2.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/prometheus/common v0.55.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/tchap/go-patricia/v2 v2.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containerd/btrfs/v2 v2.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/pkg/errors v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/logr v1.4.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-logr/stdr v1.2.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opentelemetry.io/proto/otlp v1.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/emicklei/go-restful/v3 v3.11.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/api v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/containers/ocicrypt v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/felixge/httpsnoop v1.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.opencensus.io v0.24.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/vishvananda/netns v0.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/inf.v0 v0.9.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gofuzz v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mistifyio/go-zfs/v3 v3.0.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/russross/blackfriday/v2 v2.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/cenkalti/backoff/v4 v4.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/apiserver v0.31.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/grpc-ecosystem/grpc-gateway/v2 v2.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/exp v0.0.0-20231214170342-aacd6d4b4611 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/json-iterator/go v1.1.12 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/crypto v0.28.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/term v0.25.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/moby/spdystream v0.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/fxamacker/cbor/v2 v2.7.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/miekg/pkcs11 v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stefanberger/go-pkcs11uri v0.0.0-20230803200340-78284954bff6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-jose/go-jose/v4 v4.0.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.mozilla.org/pkcs7 v0.9.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/structured-merge-diff/v4 v4.4.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading sigs.k8s.io/json v0.0.0-20221116044647-bc3834ca7abd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mxk/go-flowrate v0.0.0-20140419014527-cca7078d478f Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/golang/protobuf v1.5.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/modern-go/reflect2 v1.0.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/x448/float16 v0.8.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/text v0.19.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/yaml.v2 v2.4.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20241007155032-5fefd90f89a9 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/gorilla/websocket v1.5.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/oauth2 v0.22.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/time v0.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading go.uber.org/goleak v1.3.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/stretchr/objx v0.5.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/ginkgo/v2 v2.19.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/onsi/gomega v1.34.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonschema v1.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/spf13/pflag v1.0.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/go-multierror v1.1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/blang/semver/v4 v4.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading k8s.io/kube-openapi v0.0.0-20240228011516-70dd3763d340 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/gnostic-models v0.6.8 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/armon/go-socks5 v0.0.0-20160902184237-e75332964ef5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/frankban/quicktest v1.14.5 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/hashicorp/errwrap v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/pretty v0.3.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/rogpeppe/go-internal v1.13.1 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/kr/text v0.2.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonreference v0.0.0-20180127040603-bd5ef7bd5415 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/xeipuuv/gojsonpointer v0.0.0-20190905194746-02993c407bfb Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading golang.org/x/tools v0.21.1-0.20240508182429-e35e4ccd0d2d Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/google/pprof v0.0.0-20240525223248-4bfdf5a9a2af Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/swag v0.22.4 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonreference v0.20.2 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/go-openapi/jsonpointer v0.19.6 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/mailru/easyjson v0.7.7 Step #3 - "compile-libfuzzer-coverage-x86_64": go: downloading github.com/josharian/intern v1.0.0 Step #3 - "compile-libfuzzer-coverage-x86_64": ++ dirname /src/containerd/contrib/fuzz/oss_fuzz_build.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + cd ../../ Step #3 - "compile-libfuzzer-coverage-x86_64": + rm -r vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + OLDCXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -lresolv' Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd/\/tmp\/containerd/g' /src/containerd/defaults/defaults_unix.go Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*testing\.F' compile_native_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_native_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*testing\.F' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/auth/parse_test.go:func FuzzParseAuthHeader(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/auth Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/auth FuzzParseAuthHeader fuzz_FuzzParseAuthHeader Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/transfer/streaming/stream_test.go:func FuzzSendAndReceive(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/transfer/streaming Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/core/transfer/streaming FuzzSendAndReceive fuzz_FuzzSendAndReceive Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/cap/cap_linux_test.go:func FuzzParseProcPIDStatus(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/cap Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/cap FuzzParseProcPIDStatus fuzz_FuzzParseProcPIDStatus Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/filters/filter_test.go:func FuzzFiltersParse(f *testing.F) { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/filters Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_native_go_fuzzer github.com/containerd/containerd/v2/pkg/filters FuzzFiltersParse fuzz_FuzzFiltersParse Step #3 - "compile-libfuzzer-coverage-x86_64": mkdir: cannot create directory '/workspace/out/libfuzzer-coverage-x86_64/rawfuzzers': File exists Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func Fuzz.*data' compile_go_fuzzer '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'blocklist=(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func Fuzz.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E '(vendor|Integ)' Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/apparmor/apparmor_fuzzer.go:func FuzzLoadDefaultProfile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/apparmor FuzzLoadDefaultProfile fuzz_FuzzLoadDefaultProfile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/apparmor: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/apparmor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzApply fuzz_FuzzApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/archive_fuzzer.go:func FuzzImportIndex(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImportIndex fuzz_FuzzImportIndex Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/containerd_import_fuzzer.go:func FuzzContainerdImport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerdImport fuzz_FuzzContainerdImport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzCSWalk(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCSWalk fuzz_FuzzCSWalk Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/content_fuzzer.go:func FuzzArchiveExport(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzArchiveExport fuzz_FuzzArchiveExport Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_fuzzer.go:func FuzzParseAuth(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzParseAuth fuzz_FuzzParseAuth Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/cri_server_fuzzer.go:func FuzzCRIServer(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzCRIServer fuzz_FuzzCRIServer Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffApply(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffApply fuzz_FuzzDiffApply Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/diff_fuzzer.go:func FuzzDiffCompare(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzDiffCompare fuzz_FuzzDiffCompare Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/exchange_fuzzer.go:func FuzzExchange(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzExchange fuzz_FuzzExchange Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/fuzz_images.go:func FuzzImagesCheck(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImagesCheck fuzz_FuzzImagesCheck Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzImageStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzImageStore fuzz_FuzzImageStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzLeaseManager(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzLeaseManager fuzz_FuzzLeaseManager Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContainerStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContainerStore fuzz_FuzzContainerStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/metadata_fuzzer.go:func FuzzContentStore(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzContentStore fuzz_FuzzContentStore Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ contrib/fuzz/uuid_fuzzer.go:func FuzzUUIDParse(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/contrib/fuzz FuzzUUIDParse fuzz_FuzzUUIDParse Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/contrib/fuzz: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/contrib/fuzz Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/config/docker_fuzzer_internal.go:func FuzzParseHostsFile(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker/config FuzzParseHostsFile fuzz_FuzzParseHostsFile Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker/config: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker/config Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/converter_fuzz.go:func FuzzConvertManifest(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzConvertManifest fuzz_FuzzConvertManifest Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ core/remotes/docker/fetcher_fuzz.go:func FuzzFetcher(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/core/remotes/docker FuzzFetcher fuzz_FuzzFetcher Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/core/remotes/docker: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/core/remotes/docker Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ pkg/archive/compression/compression_fuzzer.go:func FuzzDecompressStream(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/pkg/archive/compression FuzzDecompressStream fuzz_FuzzDecompressStream Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/pkg/archive/compression: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/pkg/archive/compression Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ plugins/content/local/content_local_fuzzer.go:func FuzzContentStoreWriter(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/plugins/content/local FuzzContentStoreWriter fuzz_FuzzContentStoreWriter Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/plugins/content/local: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/plugins/content/local Step #3 - "compile-libfuzzer-coverage-x86_64": + wget --quiet https://github.com/protocolbuffers/protobuf/releases/download/v3.11.4/protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": + unzip protoc-3.11.4-linux-x86_64.zip -d /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Archive: protoc-3.11.4-linux-x86_64.zip Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/ Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/type.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/duration.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/empty.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/wrappers.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/field_mask.proto Step #3 - "compile-libfuzzer-coverage-x86_64": creating: /usr/local/include/google/protobuf/compiler/ Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/compiler/plugin.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/struct.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/any.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/descriptor.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/source_context.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/timestamp.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/include/google/protobuf/api.proto Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/bin/protoc Step #3 - "compile-libfuzzer-coverage-x86_64": inflating: /usr/local/readme.txt Step #3 - "compile-libfuzzer-coverage-x86_64": + export CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + CGO_ENABLED=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + export GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + GOARCH=amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ Step #3 - "compile-libfuzzer-coverage-x86_64": + git clone https://github.com/opencontainers/runc --branch release-1.1 Step #3 - "compile-libfuzzer-coverage-x86_64": Cloning into 'runc'... Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Enumerating objects: 44649, done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Counting objects: 0% (1/303) remote: Counting objects: 1% (4/303) remote: Counting objects: 2% (7/303) remote: Counting objects: 3% (10/303) remote: Counting objects: 4% (13/303) remote: Counting objects: 5% (16/303) remote: Counting objects: 6% (19/303) remote: Counting objects: 7% (22/303) remote: Counting objects: 8% (25/303) remote: Counting objects: 9% (28/303) remote: Counting objects: 10% (31/303) remote: Counting objects: 11% (34/303) remote: Counting objects: 12% (37/303) remote: Counting objects: 13% (40/303) remote: Counting objects: 14% (43/303) remote: Counting objects: 15% (46/303) remote: Counting objects: 16% (49/303) remote: Counting objects: 17% (52/303) remote: Counting objects: 18% (55/303) remote: Counting objects: 19% (58/303) remote: Counting objects: 20% (61/303) remote: Counting objects: 21% (64/303) remote: Counting objects: 22% (67/303) remote: Counting objects: 23% (70/303) remote: Counting objects: 24% (73/303) remote: Counting objects: 25% (76/303) remote: Counting objects: 26% (79/303) remote: Counting objects: 27% (82/303) remote: Counting objects: 28% (85/303) remote: Counting objects: 29% (88/303) remote: Counting objects: 30% (91/303) remote: Counting objects: 31% (94/303) remote: Counting objects: 32% (97/303) remote: Counting objects: 33% (100/303) remote: Counting objects: 34% (104/303) remote: Counting objects: 35% (107/303) remote: Counting objects: 36% (110/303) remote: Counting objects: 37% (113/303) remote: Counting objects: 38% (116/303) remote: Counting objects: 39% (119/303) remote: Counting objects: 40% (122/303) remote: Counting objects: 41% (125/303) remote: Counting objects: 42% (128/303) remote: Counting objects: 43% (131/303) remote: Counting objects: 44% (134/303) remote: Counting objects: 45% (137/303) remote: Counting objects: 46% (140/303) remote: Counting objects: 47% (143/303) remote: Counting objects: 48% (146/303) remote: Counting objects: 49% (149/303) remote: Counting objects: 50% (152/303) remote: Counting objects: 51% (155/303) remote: Counting objects: 52% (158/303) remote: Counting objects: 53% (161/303) remote: Counting objects: 54% (164/303) remote: Counting objects: 55% (167/303) remote: Counting objects: 56% (170/303) remote: Counting objects: 57% (173/303) remote: Counting objects: 58% (176/303) remote: Counting objects: 59% (179/303) remote: Counting objects: 60% (182/303) remote: Counting objects: 61% (185/303) remote: Counting objects: 62% (188/303) remote: Counting objects: 63% (191/303) remote: Counting objects: 64% (194/303) remote: Counting objects: 65% (197/303) remote: Counting objects: 66% (200/303) remote: Counting objects: 67% (204/303) remote: Counting objects: 68% (207/303) remote: Counting objects: 69% (210/303) remote: Counting objects: 70% (213/303) remote: Counting objects: 71% (216/303) remote: Counting objects: 72% (219/303) remote: Counting objects: 73% (222/303) remote: Counting objects: 74% (225/303) remote: Counting objects: 75% (228/303) remote: Counting objects: 76% (231/303) remote: Counting objects: 77% (234/303) remote: Counting objects: 78% (237/303) remote: Counting objects: 79% (240/303) remote: Counting objects: 80% (243/303) remote: Counting objects: 81% (246/303) remote: Counting objects: 82% (249/303) remote: Counting objects: 83% (252/303) remote: Counting objects: 84% (255/303) remote: Counting objects: 85% (258/303) remote: Counting objects: 86% (261/303) remote: Counting objects: 87% (264/303) remote: Counting objects: 88% (267/303) remote: Counting objects: 89% (270/303) remote: Counting objects: 90% (273/303) remote: Counting objects: 91% (276/303) remote: Counting objects: 92% (279/303) remote: Counting objects: 93% (282/303) remote: Counting objects: 94% (285/303) remote: Counting objects: 95% (288/303) remote: Counting objects: 96% (291/303) remote: Counting objects: 97% (294/303) remote: Counting objects: 98% (297/303) remote: Counting objects: 99% (300/303) remote: Counting objects: 100% (303/303) remote: Counting objects: 100% (303/303), done. Step #3 - "compile-libfuzzer-coverage-x86_64": remote: Compressing objects: 0% (1/179) remote: Compressing objects: 1% (2/179) remote: Compressing objects: 2% (4/179) remote: Compressing objects: 3% (6/179) remote: Compressing objects: 4% (8/179) remote: Compressing objects: 5% (9/179) remote: Compressing objects: 6% (11/179) remote: Compressing objects: 7% (13/179) remote: Compressing objects: 8% (15/179) remote: Compressing objects: 9% (17/179) remote: Compressing objects: 10% (18/179) remote: Compressing objects: 11% (20/179) remote: Compressing objects: 12% (22/179) remote: Compressing objects: 13% (24/179) remote: Compressing objects: 14% (26/179) remote: Compressing objects: 15% (27/179) remote: Compressing objects: 16% (29/179) remote: Compressing objects: 17% (31/179) remote: Compressing objects: 18% (33/179) remote: Compressing objects: 19% (35/179) remote: Compressing objects: 20% (36/179) remote: Compressing objects: 21% (38/179) remote: Compressing objects: 22% (40/179) remote: Compressing objects: 23% (42/179) remote: Compressing objects: 24% (43/179) remote: Compressing objects: 25% (45/179) remote: Compressing objects: 26% (47/179) remote: Compressing objects: 27% (49/179) remote: Compressing objects: 28% (51/179) remote: Compressing objects: 29% (52/179) remote: Compressing objects: 30% (54/179) remote: Compressing objects: 31% (56/179) remote: Compressing objects: 32% (58/179) remote: Compressing objects: 33% (60/179) remote: Compressing objects: 34% (61/179) remote: Compressing objects: 35% (63/179) remote: Compressing objects: 36% (65/179) remote: Compressing objects: 37% (67/179) remote: Compressing objects: 38% (69/179) remote: Compressing objects: 39% (70/179) remote: Compressing objects: 40% (72/179) remote: Compressing objects: 41% (74/179) remote: Compressing objects: 42% (76/179) remote: Compressing objects: 43% (77/179) remote: Compressing objects: 44% (79/179) remote: Compressing objects: 45% (81/179) remote: Compressing objects: 46% (83/179) remote: Compressing objects: 47% (85/179) remote: Compressing objects: 48% (86/179) remote: Compressing objects: 49% (88/179) remote: Compressing objects: 50% (90/179) remote: Compressing objects: 51% (92/179) remote: Compressing objects: 52% (94/179) remote: Compressing objects: 53% (95/179) remote: Compressing objects: 54% (97/179) remote: Compressing objects: 55% (99/179) remote: Compressing objects: 56% (101/179) remote: Compressing objects: 57% (103/179) remote: Compressing objects: 58% (104/179) remote: Compressing objects: 59% (106/179) remote: Compressing objects: 60% (108/179) remote: Compressing objects: 61% (110/179) remote: Compressing objects: 62% (111/179) remote: Compressing objects: 63% (113/179) remote: Compressing objects: 64% (115/179) remote: Compressing objects: 65% (117/179) remote: Compressing objects: 66% (119/179) remote: Compressing objects: 67% (120/179) remote: Compressing objects: 68% (122/179) remote: Compressing objects: 69% (124/179) remote: Compressing objects: 70% (126/179) remote: Compressing objects: 71% (128/179) remote: Compressing objects: 72% (129/179) remote: Compressing objects: 73% (131/179) remote: Compressing objects: 74% (133/179) remote: Compressing objects: 75% (135/179) remote: Compressing objects: 76% (137/179) remote: Compressing objects: 77% (138/179) remote: Compressing objects: 78% (140/179) remote: Compressing objects: 79% (142/179) remote: Compressing objects: 80% (144/179) remote: Compressing objects: 81% (145/179) remote: Compressing objects: 82% (147/179) remote: Compressing objects: 83% (149/179) remote: Compressing objects: 84% (151/179) remote: Compressing objects: 85% (153/179) remote: Compressing objects: 86% (154/179) remote: Compressing objects: 87% (156/179) remote: Compressing objects: 88% (158/179) remote: Compressing objects: 89% (160/179) remote: Compressing objects: 90% (162/179) remote: Compressing objects: 91% (163/179) remote: Compressing objects: 92% (165/179) remote: Compressing objects: 93% (167/179) remote: Compressing objects: 94% (169/179) remote: Compressing objects: 95% (171/179) remote: Compressing objects: 96% (172/179) remote: Compressing objects: 97% (174/179) remote: Compressing objects: 98% (176/179) remote: Compressing objects: 99% (178/179) remote: Compressing objects: 100% (179/179) remote: Compressing objects: 100% (179/179), done. Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 0% (1/44649) Receiving objects: 1% (447/44649) Receiving objects: 2% (893/44649) Receiving objects: 3% (1340/44649) Receiving objects: 4% (1786/44649) Receiving objects: 5% (2233/44649) Receiving objects: 6% (2679/44649) Receiving objects: 7% (3126/44649) Receiving objects: 8% (3572/44649) Receiving objects: 9% (4019/44649) Receiving objects: 10% (4465/44649) Receiving objects: 11% (4912/44649) Receiving objects: 12% (5358/44649) Receiving objects: 13% (5805/44649) Receiving objects: 14% (6251/44649) Receiving objects: 15% (6698/44649) Receiving objects: 16% (7144/44649) Receiving objects: 17% (7591/44649) Receiving objects: 18% (8037/44649) Receiving objects: 19% (8484/44649) Receiving objects: 20% (8930/44649) Receiving objects: 21% (9377/44649) Receiving objects: 22% (9823/44649) Receiving objects: 23% (10270/44649) Receiving objects: 24% (10716/44649) Receiving objects: 25% (11163/44649) Receiving objects: 26% (11609/44649) Receiving objects: 27% (12056/44649) Receiving objects: 28% (12502/44649) Receiving objects: 29% (12949/44649) Receiving objects: 30% (13395/44649) Receiving objects: 31% (13842/44649) Receiving objects: 32% (14288/44649) Receiving objects: 33% (14735/44649) Receiving objects: 34% (15181/44649) Receiving objects: 35% (15628/44649) Receiving objects: 36% (16074/44649) Receiving objects: 37% (16521/44649) Receiving objects: 38% (16967/44649) Receiving objects: 39% (17414/44649) Receiving objects: 40% (17860/44649) Receiving objects: 41% (18307/44649) Receiving objects: 42% (18753/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 43% (19200/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 44% (19646/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 45% (20093/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 46% (20539/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 47% (20986/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 48% (21432/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 49% (21879/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 50% (22325/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 51% (22771/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 52% (23218/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 53% (23664/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 54% (24111/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 55% (24557/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 56% (25004/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 57% (25450/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 58% (25897/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 59% (26343/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 60% (26790/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 61% (27236/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 62% (27683/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 63% (28129/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 64% (28576/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 65% (29022/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 66% (29469/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 67% (29915/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 68% (30362/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 69% (30808/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 70% (31255/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 71% (31701/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 72% (32148/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 73% (32594/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 74% (33041/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 75% (33487/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 76% (33934/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 77% (34380/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 78% (34827/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 79% (35273/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 80% (35720/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 81% (36166/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 82% (36613/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 83% (37059/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 84% (37506/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 85% (37952/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 86% (38399/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 87% (38845/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 88% (39292/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 89% (39738/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 90% (40185/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 91% (40631/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 92% (41078/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 93% (41524/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 94% (41971/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 95% (42417/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 96% (42864/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 97% (43310/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 98% (43757/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 99% (44203/44649), 13.18 MiB | 26.35 MiB/s remote: Total 44649 (delta 134), reused 253 (delta 112), pack-reused 44346 (from 1) Step #3 - "compile-libfuzzer-coverage-x86_64": Receiving objects: 100% (44649/44649), 13.18 MiB | 26.35 MiB/s Receiving objects: 100% (44649/44649), 22.05 MiB | 28.50 MiB/s, done. Step #3 - "compile-libfuzzer-coverage-x86_64": Resolving deltas: 0% (0/29323) Resolving deltas: 1% (299/29323) Resolving deltas: 2% (590/29323) Resolving deltas: 3% (891/29323) Resolving deltas: 4% (1178/29323) Resolving deltas: 5% (1483/29323) Resolving deltas: 6% (1767/29323) Resolving deltas: 7% (2110/29323) Resolving deltas: 8% (2346/29323) Resolving deltas: 9% (2653/29323) Resolving deltas: 10% (2959/29323) Resolving deltas: 11% (3228/29323) Resolving deltas: 12% (3520/29323) Resolving deltas: 13% (3934/29323) Resolving deltas: 14% (4172/29323) Resolving deltas: 15% (4400/29323) Resolving deltas: 16% (4716/29323) Resolving deltas: 17% (4988/29323) Resolving deltas: 18% (5303/29323) Resolving deltas: 19% (5614/29323) Resolving deltas: 20% (5874/29323) Resolving deltas: 21% (6181/29323) Resolving deltas: 22% (6453/29323) Resolving deltas: 23% (6779/29323) Resolving deltas: 24% (7066/29323) Resolving deltas: 25% (7365/29323) Resolving deltas: 26% (7628/29323) Resolving deltas: 27% (7918/29323) Resolving deltas: 28% (8226/29323) Resolving deltas: 29% (8518/29323) Resolving deltas: 30% (8830/29323) Resolving deltas: 31% (9138/29323) Resolving deltas: 32% (9417/29323) Resolving deltas: 33% (9677/29323) Resolving deltas: 34% (9989/29323) Resolving deltas: 35% (10306/29323) Resolving deltas: 36% (10702/29323) Resolving deltas: 37% (10868/29323) Resolving deltas: 38% (11245/29323) Resolving deltas: 39% (11453/29323) Resolving deltas: 40% (11731/29323) Resolving deltas: 41% (12095/29323) Resolving deltas: 42% (12339/29323) Resolving deltas: 43% (12614/29323) Resolving deltas: 44% (12945/29323) Resolving deltas: 45% (13206/29323) Resolving deltas: 47% (13791/29323) Resolving deltas: 48% (14102/29323) Resolving deltas: 49% (14381/29323) Resolving deltas: 50% (14768/29323) Resolving deltas: 51% (14963/29323) Resolving deltas: 52% (15289/29323) Resolving deltas: 53% (15561/29323) Resolving deltas: 54% (15835/29323) Resolving deltas: 55% (16132/29323) Resolving deltas: 56% (16455/29323) Resolving deltas: 57% (16810/29323) Resolving deltas: 58% (17009/29323) Resolving deltas: 59% (17301/29323) Resolving deltas: 60% (17596/29323) Resolving deltas: 61% (17914/29323) Resolving deltas: 62% (18335/29323) Resolving deltas: 63% (18475/29323) Resolving deltas: 64% (18792/29323) Resolving deltas: 65% (19198/29323) Resolving deltas: 66% (19380/29323) Resolving deltas: 67% (19651/29323) Resolving deltas: 68% (19941/29323) Resolving deltas: 69% (20254/29323) Resolving deltas: 70% (20541/29323) Resolving deltas: 71% (20833/29323) Resolving deltas: 72% (21120/29323) Resolving deltas: 73% (21419/29323) Resolving deltas: 74% (21729/29323) Resolving deltas: 75% (22096/29323) Resolving deltas: 76% (22307/29323) Resolving deltas: 77% (22635/29323) Resolving deltas: 78% (22992/29323) Resolving deltas: 79% (23225/29323) Resolving deltas: 80% (23609/29323) Resolving deltas: 81% (23791/29323) Resolving deltas: 82% (24051/29323) Resolving deltas: 83% (24347/29323) Resolving deltas: 84% (24632/29323) Resolving deltas: 85% (24929/29323) Resolving deltas: 86% (25219/29323) Resolving deltas: 87% (25517/29323) Resolving deltas: 88% (25805/29323) Resolving deltas: 89% (26103/29323) Resolving deltas: 90% (26414/29323) Resolving deltas: 91% (26694/29323) Resolving deltas: 92% (26993/29323) Resolving deltas: 93% (27273/29323) Resolving deltas: 94% (27568/29323) Resolving deltas: 95% (27863/29323) Resolving deltas: 96% (28153/29323) Resolving deltas: 97% (28448/29323) Resolving deltas: 98% (28794/29323) Resolving deltas: 99% (29034/29323) Resolving deltas: 100% (29323/29323) Resolving deltas: 100% (29323/29323), done. Step #3 - "compile-libfuzzer-coverage-x86_64": + cd runc Step #3 - "compile-libfuzzer-coverage-x86_64": + make Step #3 - "compile-libfuzzer-coverage-x86_64": go build -trimpath "-buildmode=pie" -tags "seccomp" -ldflags "-X main.gitCommit=v1.1.15-2-g06833792 -X main.version=1.1.15+dev " -o runc . Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": install -D -m0755 runc /usr/local/sbin/runc Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + make STATIC=1 Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/ctr -ldflags '-X github.com/containerd/containerd/v2/version.Version=480e85d.m -X github.com/containerd/containerd/v2/version.Revision=480e85de2d384b79c62f3e4d33afa9d8017c1b39.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/ctr Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd -ldflags '-X github.com/containerd/containerd/v2/version.Version=480e85d.m -X github.com/containerd/containerd/v2/version.Revision=480e85de2d384b79c62f3e4d33afa9d8017c1b39.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": # github.com/containerd/containerd/v2/cmd/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/ld: /usr/bin/ld: DWARF error: invalid or unhandled FORM value: 0x25 Step #3 - "compile-libfuzzer-coverage-x86_64": /tmp/go-link-2534331293/000020.o: in function `New': Step #3 - "compile-libfuzzer-coverage-x86_64": pkcs11.cgo2.c:(.text+0x22): warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": go build -gcflags=-trimpath=/root/go/src -o bin/containerd-stress -ldflags '-X github.com/containerd/containerd/v2/version.Version=480e85d.m -X github.com/containerd/containerd/v2/version.Revision=480e85de2d384b79c62f3e4d33afa9d8017c1b39.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -s -w -extldflags "-static" ' -tags "urfave_cli_no_docs osusergo netgo static_build" ./cmd/containerd-stress Step #3 - "compile-libfuzzer-coverage-x86_64": + bin/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": CGO_ENABLED=0 go build -o bin/containerd-shim-runc-v2 -ldflags '-X github.com/containerd/containerd/v2/version.Version=480e85d.m -X github.com/containerd/containerd/v2/version.Revision=480e85de2d384b79c62f3e4d33afa9d8017c1b39.m -X github.com/containerd/containerd/v2/version.Package=github.com/containerd/containerd/v2 -extldflags "-static" -s -w' -tags "urfave_cli_no_docs osusergo netgo static_build no_grpc" ./cmd/containerd-shim-runc-v2 Step #3 - "compile-libfuzzer-coverage-x86_64": + binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/containerd/bin Step #3 - "compile-libfuzzer-coverage-x86_64": + cp containerd containerd-shim-runc-v2 containerd-stress ctr /workspace/out/libfuzzer-coverage-x86_64/containerd-binaries/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd - Step #3 - "compile-libfuzzer-coverage-x86_64": /src/containerd Step #3 - "compile-libfuzzer-coverage-x86_64": + sed -i 's/\/run\/containerd-test/\/tmp\/containerd-test/g' /src/containerd/integration/client/client_unix_test.go Step #3 - "compile-libfuzzer-coverage-x86_64": + cd integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_fuzzers '^func FuzzInteg.*data' compile_go_fuzzer vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + local 'regex=^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": + local compile_fuzzer=compile_go_fuzzer Step #3 - "compile-libfuzzer-coverage-x86_64": + local blocklist=vendor Step #3 - "compile-libfuzzer-coverage-x86_64": ++ git grep --full-name '^func FuzzInteg.*data' Step #3 - "compile-libfuzzer-coverage-x86_64": ++ grep -v -E vendor Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegNoTearDownWithDownload(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegNoTearDownWithDownload fuzz_FuzzIntegNoTearDownWithDownload Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerNoTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerNoTearDown fuzz_FuzzIntegCreateContainerNoTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + for line in $(git grep --full-name "$regex" | grep -v -E "$blocklist") Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ integration/client/container_fuzzer.go:func FuzzIntegCreateContainerWithTearDown(data []byte) int { =~ (.*)/.*:.*(Fuzz[A-Za-z0-9]+) ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + local pkg=integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + local func=FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": + compile_go_fuzzer github.com/containerd/containerd/v2/integration/client FuzzIntegCreateContainerWithTearDown fuzz_FuzzIntegCreateContainerWithTearDown Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/containerd/containerd/v2/integration/client: No such file or directory Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": github.com/containerd/containerd/v2/integration/client Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.options /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cp /src/containerd/contrib/fuzz/fuzz_FuzzImportIndex.dict /workspace/out/libfuzzer-coverage-x86_64/ Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++' Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 51df0d6876cd: Already exists Step #4: 38da3118a46e: Already exists Step #4: 76485c50adab: Pulling fs layer Step #4: 6e454ec0415e: Pulling fs layer Step #4: fcc56198b7b3: Pulling fs layer Step #4: 839d42049c75: Pulling fs layer Step #4: 9b7f47b799be: Pulling fs layer Step #4: 885b716fb19d: Pulling fs layer Step #4: 1f82e1e2eaac: Pulling fs layer Step #4: 3582fe5817de: Pulling fs layer Step #4: a221f9a44ef5: Pulling fs layer Step #4: e9f45d43ad23: Pulling fs layer Step #4: db56863ee7be: Pulling fs layer Step #4: 84816e0f3769: Pulling fs layer Step #4: a6399624745a: Pulling fs layer Step #4: 0715e4009fac: Pulling fs layer Step #4: 4e5763569d03: Pulling fs layer Step #4: 7f4c947f7af3: Pulling fs layer Step #4: 30d1cf1bf2b4: Pulling fs layer Step #4: 839d42049c75: Waiting Step #4: a221f9a44ef5: Waiting Step #4: 9b7f47b799be: Waiting Step #4: e9f45d43ad23: Waiting Step #4: 885b716fb19d: Waiting Step #4: db56863ee7be: Waiting Step #4: 84816e0f3769: Waiting Step #4: a6399624745a: Waiting Step #4: 1f82e1e2eaac: Waiting Step #4: 0715e4009fac: Waiting Step #4: 4e5763569d03: Waiting Step #4: 3582fe5817de: Waiting Step #4: 7f4c947f7af3: Waiting Step #4: 30d1cf1bf2b4: Waiting Step #4: fcc56198b7b3: Verifying Checksum Step #4: fcc56198b7b3: Download complete Step #4: 76485c50adab: Verifying Checksum Step #4: 76485c50adab: Download complete Step #4: 6e454ec0415e: Verifying Checksum Step #4: 6e454ec0415e: Download complete Step #4: 76485c50adab: Pull complete Step #4: 9b7f47b799be: Verifying Checksum Step #4: 9b7f47b799be: Download complete Step #4: 885b716fb19d: Verifying Checksum Step #4: 885b716fb19d: Download complete Step #4: 1f82e1e2eaac: Verifying Checksum Step #4: 1f82e1e2eaac: Download complete Step #4: 6e454ec0415e: Pull complete Step #4: a221f9a44ef5: Verifying Checksum Step #4: a221f9a44ef5: Download complete Step #4: fcc56198b7b3: Pull complete Step #4: 3582fe5817de: Verifying Checksum Step #4: 3582fe5817de: Download complete Step #4: db56863ee7be: Verifying Checksum Step #4: db56863ee7be: Download complete Step #4: 839d42049c75: Verifying Checksum Step #4: 839d42049c75: Download complete Step #4: 84816e0f3769: Download complete Step #4: a6399624745a: Verifying Checksum Step #4: a6399624745a: Download complete Step #4: 0715e4009fac: Verifying Checksum Step #4: 0715e4009fac: Download complete Step #4: 4e5763569d03: Verifying Checksum Step #4: 4e5763569d03: Download complete Step #4: 7f4c947f7af3: Verifying Checksum Step #4: 7f4c947f7af3: Download complete Step #4: 30d1cf1bf2b4: Download complete Step #4: e9f45d43ad23: Verifying Checksum Step #4: e9f45d43ad23: Download complete Step #4: 839d42049c75: Pull complete Step #4: 9b7f47b799be: Pull complete Step #4: 885b716fb19d: Pull complete Step #4: 1f82e1e2eaac: Pull complete Step #4: 3582fe5817de: Pull complete Step #4: a221f9a44ef5: Pull complete Step #4: e9f45d43ad23: Pull complete Step #4: db56863ee7be: Pull complete Step #4: 84816e0f3769: Pull complete Step #4: a6399624745a: Pull complete Step #4: 0715e4009fac: Pull complete Step #4: 4e5763569d03: Pull complete Step #4: 7f4c947f7af3: Pull complete Step #4: 30d1cf1bf2b4: Pull complete Step #4: Digest: sha256:cb894d78b81942499e77d79f91f562ce74c084f3ca1001f2c72a30e5404d1f69 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: [/corpus/fuzz_FuzzCRIServer.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzCRIServer.zip or Step #5: /corpus/fuzz_FuzzCRIServer.zip.zip, and cannot find /corpus/fuzz_FuzzCRIServer.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzCRIServer. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: [/corpus/fuzz_FuzzContainerdImport.zip] Step #5: End-of-central-directory signature not found. Either this file is not Step #5: a zipfile, or it constitutes one disk of a multi-part archive. In the Step #5: latter case the central directory and zipfile comment will be found on Step #5: the last disk(s) of this archive. Step #5: unzip: cannot find zipfile directory in one of /corpus/fuzz_FuzzContainerdImport.zip or Step #5: /corpus/fuzz_FuzzContainerdImport.zip.zip, and cannot find /corpus/fuzz_FuzzContainerdImport.zip.ZIP, period. Step #5: Failed to unpack the corpus for fuzz_FuzzContainerdImport. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: warning [/corpus/fuzz_FuzzIntegNoTearDownWithDownload.zip]: zipfile is empty Step #5: Failed to unpack the corpus for fuzz_FuzzIntegNoTearDownWithDownload. This usually means that corpus backup for a particular fuzz target does not exist. If a fuzz target was added in the last 24 hours, please wait one more day. Otherwise, something is wrong with the fuzz target or the infrastructure, and corpus pruning task does not finish successfully. Step #5: Running go target fuzz_FuzzConvertManifest Step #5: Running go target fuzz_FuzzContentStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzLeaseManager Step #5: Running go target fuzz_FuzzExchange Step #5: Running go target fuzz_FuzzIntegNoTearDownWithDownload Step #5: cp: cannot stat '/corpus/fuzz_FuzzIntegNoTearDownWithDownload/': No such file or directory Step #5: Running go target fuzz_FuzzLoadDefaultProfile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: No such file or directory Step #5: Running go target fuzz_FuzzImportIndex Step #5: 2024/11/20 06:32:51 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegNoTearDownWithDownload.profdata: no such file or directory Step #5: Running go target fuzz_FuzzContentStoreWriter Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzDiffApply Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzCSWalk Step #5: Running go target fuzz_FuzzIntegCreateContainerWithTearDown Step #5: Running go target fuzz_FuzzFetcher Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: No such file or directory Step #5: 2024/11/20 06:32:51 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerWithTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzArchiveExport Step #5: Running go target fuzz_FuzzParseProcPIDStatus Step #5: Running go target fuzz_FuzzSendAndReceive Step #5: Running go target fuzz_FuzzContainerStore Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzDiffApply: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffApply/00b5ce72369c1046611f0e64461449cb9f7edd0b non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.2% of statements in github.com/containerd/containerd/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzParseAuthHeader Step #5: Running go target fuzz_FuzzFiltersParse Step #5: Running go target fuzz_FuzzApply Step #5: Running go target fuzz_FuzzDecompressStream Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzImageStore Step #5: Running go target fuzz_FuzzParseAuth Step #5: Running go target fuzz_FuzzParseHostsFile Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzExchange: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzExchange/00e67c4f860a4ff5a1140ec2678bcc0a55a40d43 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.2% of statements in github.com/containerd/containerd/v2/... Step #5: Running go target fuzz_FuzzCRIServer Step #5: cp: cannot stat '/corpus/fuzz_FuzzCRIServer/': No such file or directory Step #5: Running go target fuzz_FuzzUUIDParse Step #5: Running go target fuzz_FuzzIntegCreateContainerNoTearDown Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: sed: can't read /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: No such file or directory Step #5: 2024/11/20 06:33:12 failed to parse profiles: open /workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzIntegCreateContainerNoTearDown.profdata: no such file or directory Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Running go target fuzz_FuzzContainerdImport Step #5: cp: cannot stat '/corpus/fuzz_FuzzContainerdImport/': No such file or directory Step #5: Running go target fuzz_FuzzImagesCheck Step #5: Running go target fuzz_FuzzDiffCompare Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: /workspace/out/libfuzzer-coverage-x86_64 Step #5: Error occured while running fuzz_FuzzLeaseManager: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzLeaseManager/001b9f643bbea7fe4e10433fedf8c06ce7e43494 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.6% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzUUIDParse: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzUUIDParse/018b33ac5992917ccc5b725c2e71340084e58e03 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.0% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImagesCheck: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.00s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImagesCheck/0053576e8ebfb61c5b836a8428d62fa68f4c04ff non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 5.5% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzDiffCompare: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzDiffCompare/00550c304e9d5ee9b8150f1c53df81cbbaf43b7d non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.4% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzImageStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzImageStore/001284856f3343339dfee8a0d4f63b85581cd304 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 6.7% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContentStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContentStore/0018419781dbd531d1319298b1ecba2ffce226fe non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 8.0% of statements in github.com/containerd/containerd/v2/... Step #5: Error occured while running fuzz_FuzzContainerStore: Step #5: --- FAIL: TestFuzzCRIServerCorpus (0.01s) Step #5: fuzzcriserver_test.go:35: Fuzz panicked in /corpus/fuzz_FuzzContainerStore/002b97bab843f6c3358bc99ec21d31fb8f935d69 non-positive interval for NewTicker Step #5: FAIL Step #5: coverage: 7.8% of statements in github.com/containerd/containerd/v2/... Step #5: /workspace/out/libfuzzer-coverage-x86_64/dumps Step #5: 2024/11/20 06:36:12 Cannot parse profile at "/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_FuzzCRIServer.perf.cpu.prof": parsing profile: empty input file Step #5: mv: cannot stat 'merged.data': No such file or directory Step #5: Finished generating code coverage report for Go fuzz targets. Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/heap.prof [Content-Type=application/octet-stream]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/4 files][ 0.0 B/ 8.5 MiB] 0% Done / [1/4 files][ 3.5 MiB/ 8.5 MiB] 41% Done / [2/4 files][ 8.5 MiB/ 8.5 MiB] 99% Done / [3/4 files][ 8.5 MiB/ 8.5 MiB] 99% Done / [4/4 files][ 8.5 MiB/ 8.5 MiB] 100% Done Step #7: Operation completed over 4 objects/8.5 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDecompressStream.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFetcher.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImageStore.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzExchange.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCRIServer.json [Content-Type=application/json]... Step #9: / [0/30 files][ 0.0 B/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLoadDefaultProfile.json [Content-Type=application/json]... Step #9: / [0/30 files][ 1.4 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImportIndex.json [Content-Type=application/json]... Step #9: / [0/30 files][ 1.4 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseProcPIDStatus.json [Content-Type=application/json]... Step #9: / [0/30 files][ 24.0 KiB/ 3.3 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzSendAndReceive.json [Content-Type=application/json]... Step #9: / [0/30 files][230.0 KiB/ 3.3 MiB] 6% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzLeaseManager.json [Content-Type=application/json]... Step #9: / [0/30 files][638.7 KiB/ 3.3 MiB] 18% Done / [1/30 files][659.8 KiB/ 3.3 MiB] 19% Done / [2/30 files][659.8 KiB/ 3.3 MiB] 19% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzConvertManifest.json [Content-Type=application/json]... Step #9: / [2/30 files][863.7 KiB/ 3.3 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuth.json [Content-Type=application/json]... Step #9: / [2/30 files][863.7 KiB/ 3.3 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStore.json [Content-Type=application/json]... Step #9: / [2/30 files][866.4 KiB/ 3.3 MiB] 25% Done / [3/30 files][866.4 KiB/ 3.3 MiB] 25% Done / [4/30 files][866.4 KiB/ 3.3 MiB] 25% Done / [5/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerdImport.json [Content-Type=application/json]... Step #9: / [5/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerNoTearDown.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzUUIDParse.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseHostsFile.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffApply.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContainerStore.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzApply.json [Content-Type=application/json]... Step #9: / [6/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done / [7/30 files][ 1.0 MiB/ 3.3 MiB] 31% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzParseAuthHeader.json [Content-Type=application/json]... Step #9: / [7/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzContentStoreWriter.json [Content-Type=application/json]... Step #9: / [8/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done / [8/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegCreateContainerWithTearDown.json [Content-Type=application/json]... Step #9: / [8/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzFiltersParse.json [Content-Type=application/json]... Step #9: / [8/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done / [9/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzIntegNoTearDownWithDownload.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzImagesCheck.json [Content-Type=application/json]... Step #9: / [9/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done / [10/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzCSWalk.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzArchiveExport.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzz_FuzzDiffCompare.json [Content-Type=application/json]... Step #9: / [10/30 files][ 1.1 MiB/ 3.3 MiB] 32% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #9: / [10/30 files][ 1.9 MiB/ 3.3 MiB] 56% Done / [11/30 files][ 1.9 MiB/ 3.3 MiB] 56% Done / [12/30 files][ 2.1 MiB/ 3.3 MiB] 63% Done / [13/30 files][ 2.3 MiB/ 3.3 MiB] 69% Done / [14/30 files][ 2.3 MiB/ 3.3 MiB] 69% Done / [15/30 files][ 2.5 MiB/ 3.3 MiB] 75% Done - - [16/30 files][ 2.5 MiB/ 3.3 MiB] 75% Done - [17/30 files][ 2.7 MiB/ 3.3 MiB] 81% Done - [18/30 files][ 2.7 MiB/ 3.3 MiB] 81% Done - [19/30 files][ 2.7 MiB/ 3.3 MiB] 81% Done - [20/30 files][ 2.7 MiB/ 3.3 MiB] 81% Done - [21/30 files][ 2.7 MiB/ 3.3 MiB] 81% Done - [22/30 files][ 3.1 MiB/ 3.3 MiB] 93% Done - [23/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [24/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [25/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [26/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [27/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [28/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [29/30 files][ 3.3 MiB/ 3.3 MiB] 99% Done - [30/30 files][ 3.3 MiB/ 3.3 MiB] 100% Done Step #9: Operation completed over 30 objects/3.3 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzUUIDParse.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzArchiveExport.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffCompare.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImagesCheck.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzExchange.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 0.0 B/ 5.5 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuthHeader.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 270.0 B/ 5.5 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImageStore.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 270.0 B/ 5.5 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerWithTearDown.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseProcPIDStatus.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 270.0 B/ 5.5 KiB] 4% Done / [0/29 files][ 270.0 B/ 5.5 KiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFiltersParse.log [Content-Type=application/octet-stream]... Step #11: / [0/29 files][ 619.0 B/ 5.5 KiB] 11% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCSWalk.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 619.0 B/ 5.5 KiB] 11% Done / [1/29 files][ 619.0 B/ 5.5 KiB] 11% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzImportIndex.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzFetcher.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLoadDefaultProfile.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStoreWriter.log [Content-Type=application/octet-stream]... Step #11: / [1/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done / [2/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done / [3/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done / [4/29 files][ 1.1 KiB/ 5.5 KiB] 20% Done / [5/29 files][ 1.2 KiB/ 5.5 KiB] 21% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzCRIServer.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDiffApply.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerStore.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzSendAndReceive.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzConvertManifest.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseHostsFile.log [Content-Type=application/octet-stream]... Step #11: / [5/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done / [6/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzDecompressStream.log [Content-Type=application/octet-stream]... Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzParseAuth.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done / [6/29 files][ 2.2 KiB/ 5.5 KiB] 40% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContainerdImport.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 2.3 KiB/ 5.5 KiB] 42% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzApply.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 2.4 KiB/ 5.5 KiB] 43% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzContentStore.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegCreateContainerNoTearDown.log [Content-Type=application/octet-stream]... Step #11: / [6/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done / [7/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done / [8/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done / [9/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzIntegNoTearDownWithDownload.log [Content-Type=application/octet-stream]... Step #11: / [9/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzz_FuzzLeaseManager.log [Content-Type=application/octet-stream]... Step #11: / [9/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done / [10/29 files][ 2.5 KiB/ 5.5 KiB] 46% Done / [11/29 files][ 2.6 KiB/ 5.5 KiB] 47% Done / [12/29 files][ 2.7 KiB/ 5.5 KiB] 49% Done / [13/29 files][ 2.7 KiB/ 5.5 KiB] 49% Done / [14/29 files][ 2.7 KiB/ 5.5 KiB] 49% Done / [15/29 files][ 2.7 KiB/ 5.5 KiB] 49% Done / [16/29 files][ 3.2 KiB/ 5.5 KiB] 58% Done / [17/29 files][ 3.6 KiB/ 5.5 KiB] 65% Done - - [18/29 files][ 5.2 KiB/ 5.5 KiB] 94% Done - [19/29 files][ 5.2 KiB/ 5.5 KiB] 94% Done - [20/29 files][ 5.2 KiB/ 5.5 KiB] 95% Done - [21/29 files][ 5.2 KiB/ 5.5 KiB] 95% Done - [22/29 files][ 5.4 KiB/ 5.5 KiB] 98% Done - [23/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [24/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [25/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [26/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [27/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [28/29 files][ 5.5 KiB/ 5.5 KiB] 99% Done - [29/29 files][ 5.5 KiB/ 5.5 KiB] 100% Done Step #11: Operation completed over 29 objects/5.5 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #12: / [0 files][ 0.0 B/ 324.0 B] / [1 files][ 324.0 B/ 324.0 B] Step #12: Operation completed over 1 objects/324.0 B. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/curl Step #13: % Total % Received % Xferd Average Speed Time Time Time Current Step #13: Dload Upload Total Spent Left Speed Step #13: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 318 0 0 100 318 0 1528 --:--:-- --:--:-- --:--:-- 1528 100 318 0 0 100 318 0 1521 --:--:-- --:--:-- --:--:-- 1521 Finished Step #13 PUSH DONE