starting build "04dd7aa6-fb0d-4194-a5ce-8076ada425a3" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.12kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: f315fc4a16bf: Pulling fs layer Step #1: 3307b77f93fb: Pulling fs layer Step #1: f6110affe327: Pulling fs layer Step #1: a53b40aef289: Pulling fs layer Step #1: b58f52d4d691: Pulling fs layer Step #1: 31deb284a221: Pulling fs layer Step #1: 27f8fa09cb0a: Pulling fs layer Step #1: 416bf423c8bd: Pulling fs layer Step #1: 9013276165d0: Pulling fs layer Step #1: 9e3289b229ae: Pulling fs layer Step #1: acde4effbbc6: Pulling fs layer Step #1: f6110affe327: Waiting Step #1: e4018246405e: Pulling fs layer Step #1: d37b07a106c7: Pulling fs layer Step #1: a53b40aef289: Waiting Step #1: 692fc8c13b7b: Pulling fs layer Step #1: e68c1244f22f: Pulling fs layer Step #1: 0678ff4cfd7e: Pulling fs layer Step #1: b58f52d4d691: Waiting Step #1: 7b31b68b1e08: Pulling fs layer Step #1: e0ea549b376f: Pulling fs layer Step #1: 565cb46be8c5: Pulling fs layer Step #1: 5e419887d72e: Pulling fs layer Step #1: a57510d87145: Pulling fs layer Step #1: 51297e16a529: Pulling fs layer Step #1: e961460e6665: Pulling fs layer Step #1: a96990e83450: Pulling fs layer Step #1: c9b9e7892a7d: Pulling fs layer Step #1: 082e1160dd0c: Pulling fs layer Step #1: 31deb284a221: Waiting Step #1: 0ce6da54d1b7: Pulling fs layer Step #1: 27f8fa09cb0a: Waiting Step #1: 4472439f1ad4: Pulling fs layer Step #1: 416bf423c8bd: Waiting Step #1: 53c7283565d6: Pulling fs layer Step #1: 9013276165d0: Waiting Step #1: e650a9b2455a: Pulling fs layer Step #1: 9e3289b229ae: Waiting Step #1: e961460e6665: Waiting Step #1: d37b07a106c7: Waiting Step #1: e68c1244f22f: Waiting Step #1: e0ea549b376f: Waiting Step #1: 692fc8c13b7b: Waiting Step #1: a96990e83450: Waiting Step #1: e4018246405e: Waiting Step #1: 4472439f1ad4: Waiting Step #1: 5e419887d72e: Waiting Step #1: a57510d87145: Waiting Step #1: 7b31b68b1e08: Waiting Step #1: 565cb46be8c5: Waiting Step #1: 0ce6da54d1b7: Waiting Step #1: 53c7283565d6: Waiting Step #1: e650a9b2455a: Waiting Step #1: 0678ff4cfd7e: Waiting Step #1: 51297e16a529: Waiting Step #1: 3307b77f93fb: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: f6110affe327: Verifying Checksum Step #1: f6110affe327: Download complete Step #1: a53b40aef289: Verifying Checksum Step #1: a53b40aef289: Download complete Step #1: b58f52d4d691: Download complete Step #1: 27f8fa09cb0a: Verifying Checksum Step #1: 27f8fa09cb0a: Download complete Step #1: 416bf423c8bd: Download complete Step #1: f315fc4a16bf: Verifying Checksum Step #1: f315fc4a16bf: Download complete Step #1: 9e3289b229ae: Verifying Checksum Step #1: 9e3289b229ae: Download complete Step #1: acde4effbbc6: Verifying Checksum Step #1: acde4effbbc6: Download complete Step #1: b549f31133a9: Pull complete Step #1: e4018246405e: Verifying Checksum Step #1: e4018246405e: Download complete Step #1: d37b07a106c7: Verifying Checksum Step #1: d37b07a106c7: Download complete Step #1: 692fc8c13b7b: Download complete Step #1: e68c1244f22f: Verifying Checksum Step #1: e68c1244f22f: Download complete Step #1: 0678ff4cfd7e: Verifying Checksum Step #1: 0678ff4cfd7e: Download complete Step #1: 7b31b68b1e08: Download complete Step #1: e0ea549b376f: Verifying Checksum Step #1: e0ea549b376f: Download complete Step #1: 565cb46be8c5: Verifying Checksum Step #1: 565cb46be8c5: Download complete Step #1: 5e419887d72e: Download complete Step #1: 9013276165d0: Verifying Checksum Step #1: 9013276165d0: Download complete Step #1: 51297e16a529: Download complete Step #1: a57510d87145: Verifying Checksum Step #1: a57510d87145: Download complete Step #1: e961460e6665: Verifying Checksum Step #1: e961460e6665: Download complete Step #1: a96990e83450: Verifying Checksum Step #1: a96990e83450: Download complete Step #1: c9b9e7892a7d: Verifying Checksum Step #1: c9b9e7892a7d: Download complete Step #1: 0ce6da54d1b7: Download complete Step #1: 082e1160dd0c: Verifying Checksum Step #1: 082e1160dd0c: Download complete Step #1: 4472439f1ad4: Verifying Checksum Step #1: 4472439f1ad4: Download complete Step #1: 53c7283565d6: Verifying Checksum Step #1: 53c7283565d6: Download complete Step #1: 31deb284a221: Verifying Checksum Step #1: 31deb284a221: Download complete Step #1: e650a9b2455a: Verifying Checksum Step #1: e650a9b2455a: Download complete Step #1: f315fc4a16bf: Pull complete Step #1: 3307b77f93fb: Pull complete Step #1: f6110affe327: Pull complete Step #1: a53b40aef289: Pull complete Step #1: b58f52d4d691: Pull complete Step #1: 31deb284a221: Pull complete Step #1: 27f8fa09cb0a: Pull complete Step #1: 416bf423c8bd: Pull complete Step #1: 9013276165d0: Pull complete Step #1: 9e3289b229ae: Pull complete Step #1: acde4effbbc6: Pull complete Step #1: e4018246405e: Pull complete Step #1: d37b07a106c7: Pull complete Step #1: 692fc8c13b7b: Pull complete Step #1: e68c1244f22f: Pull complete Step #1: 0678ff4cfd7e: Pull complete Step #1: 7b31b68b1e08: Pull complete Step #1: e0ea549b376f: Pull complete Step #1: 565cb46be8c5: Pull complete Step #1: 5e419887d72e: Pull complete Step #1: a57510d87145: Pull complete Step #1: 51297e16a529: Pull complete Step #1: e961460e6665: Pull complete Step #1: a96990e83450: Pull complete Step #1: c9b9e7892a7d: Pull complete Step #1: 082e1160dd0c: Pull complete Step #1: 0ce6da54d1b7: Pull complete Step #1: 4472439f1ad4: Pull complete Step #1: 53c7283565d6: Pull complete Step #1: e650a9b2455a: Pull complete Step #1: Digest: sha256:bbbd2600deeca67f058af43326330ee7a186ae74438ddc2f574d3fb6c62f0e68 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> d68d5e4be93d Step #1: Step 2/5 : RUN git clone https://github.com/gitpython-developers/gitpython gitpython Step #1: ---> Running in 1278409c741a Step #1: Cloning into 'gitpython'... Step #1: Removing intermediate container 1278409c741a Step #1: ---> e5e3463e76f5 Step #1: Step 3/5 : RUN $SRC/gitpython/fuzzing/oss-fuzz-scripts/container-environment-bootstrap.sh Step #1: ---> Running in ce1eba0eda3b Step #1: Cloning into 'qa-assets'... Step #1: sending incremental file list Step #1: ./ Step #1: fuzz_config_seed_corpus.zip Step #1: fuzz_tree_seed_corpus.zip Step #1: Step #1: sent 2,227,424 bytes received 57 bytes 4,454,962.00 bytes/sec Step #1: total size is 2,226,653 speedup is 1.00 Step #1: Collecting pip Step #1: Downloading https://files.pythonhosted.org/packages/8a/6a/19e9fe04fca059ccf770861c7d5721ab4c2aebc539889e97c7977528a53b/pip-24.0-py3-none-any.whl (2.1MB) Step #1: Installing collected packages: pip Step #1: Found existing installation: pip 19.2.3 Step #1: Uninstalling pip-19.2.3: Step #1: Successfully uninstalled pip-19.2.3 Step #1: Successfully installed pip-24.0 Step #1: Collecting setuptools~=69.0 Step #1: Downloading setuptools-69.5.1-py3-none-any.whl.metadata (6.2 kB) Step #1: Collecting pyinstaller~=6.0 Step #1: Downloading pyinstaller-6.6.0-py3-none-manylinux2014_x86_64.whl.metadata (8.3 kB) Step #1: Requirement already satisfied: altgraph in /usr/local/lib/python3.8/site-packages (from pyinstaller~=6.0) (0.17.4) Step #1: Requirement already satisfied: pyinstaller-hooks-contrib>=2024.3 in /usr/local/lib/python3.8/site-packages (from pyinstaller~=6.0) (2024.4) Step #1: Requirement already satisfied: packaging>=22.0 in /usr/local/lib/python3.8/site-packages (from pyinstaller~=6.0) (24.0) Step #1: Requirement already satisfied: importlib-metadata>=4.6 in /usr/local/lib/python3.8/site-packages (from pyinstaller~=6.0) (7.1.0) Step #1: Requirement already satisfied: zipp>=0.5 in /usr/local/lib/python3.8/site-packages (from importlib-metadata>=4.6->pyinstaller~=6.0) (3.18.1) Step #1: Downloading setuptools-69.5.1-py3-none-any.whl (894 kB) Step #1: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 894.6/894.6 kB 5.9 MB/s eta 0:00:00 Step #1: Downloading pyinstaller-6.6.0-py3-none-manylinux2014_x86_64.whl (681 kB) Step #1: ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 682.0/682.0 kB 34.7 MB/s eta 0:00:00 Step #1: Installing collected packages: setuptools, pyinstaller Step #1: Attempting uninstall: setuptools Step #1: Found existing installation: setuptools 41.2.0 Step #1: Uninstalling setuptools-41.2.0: Step #1: Successfully uninstalled setuptools-41.2.0 Step #1: Attempting uninstall: pyinstaller Step #1: Found existing installation: pyinstaller 5.0.1 Step #1: Uninstalling pyinstaller-5.0.1: Step #1: Successfully uninstalled pyinstaller-5.0.1 Step #1: Successfully installed pyinstaller-6.6.0 setuptools-69.5.1 Step #1: WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv Step #1: Removing intermediate container ce1eba0eda3b Step #1: ---> c30ed3faa256 Step #1: Step 4/5 : COPY *.sh $SRC/ Step #1: ---> 6953e9cc47a5 Step #1: Step 5/5 : WORKDIR $SRC/gitpython Step #1: ---> Running in c45e2721415b Step #1: Removing intermediate container c45e2721415b Step #1: ---> 468466dd5e64 Step #1: Successfully built 468466dd5e64 Step #1: Successfully tagged gcr.io/oss-fuzz/gitpython:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gitpython Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileo2b2BO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gitpython/.git Step #2 - "srcmap": + GIT_DIR=/src/gitpython Step #2 - "srcmap": + cd /src/gitpython Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/gitpython-developers/gitpython Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=00bc70710594800e41fad5c63694568e562b62c5 Step #2 - "srcmap": + jq_inplace /tmp/fileo2b2BO '."/src/gitpython" = { type: "git", url: "https://github.com/gitpython-developers/gitpython", rev: "00bc70710594800e41fad5c63694568e562b62c5" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileK8hknb Step #2 - "srcmap": + cat /tmp/fileo2b2BO Step #2 - "srcmap": + jq '."/src/gitpython" = { type: "git", url: "https://github.com/gitpython-developers/gitpython", rev: "00bc70710594800e41fad5c63694568e562b62c5" }' Step #2 - "srcmap": + mv /tmp/fileK8hknb /tmp/fileo2b2BO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileo2b2BO Step #2 - "srcmap": + rm /tmp/fileo2b2BO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gitpython": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/gitpython-developers/gitpython", Step #2 - "srcmap": "rev": "00bc70710594800e41fad5c63694568e562b62c5" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + . /src/gitpython/fuzzing/oss-fuzz-scripts/build.sh Step #3 - "compile-libfuzzer-address-x86_64": ++ set -euo pipefail Step #3 - "compile-libfuzzer-address-x86_64": ++ python3 -m pip install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/gitpython Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Installing backend dependencies ... [?25l- \ | done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25hCollecting gitdb<5,>=4.0.1 (from GitPython==3.1.43) Step #3 - "compile-libfuzzer-address-x86_64": Downloading gitdb-4.0.11-py3-none-any.whl.metadata (1.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting smmap<6,>=3.0.1 (from gitdb<5,>=4.0.1->GitPython==3.1.43) Step #3 - "compile-libfuzzer-address-x86_64": Downloading smmap-5.0.1-py3-none-any.whl.metadata (4.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading gitdb-4.0.11-py3-none-any.whl (62 kB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/62.7 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━ 30.7/62.7 kB 2.8 MB/s eta 0:00:01  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 62.7/62.7 kB 1.2 MB/s eta 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading smmap-5.0.1-py3-none-any.whl (24 kB) Step #3 - "compile-libfuzzer-address-x86_64": Building wheels for collected packages: GitPython Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for GitPython (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for GitPython: filename=GitPython-3.1.43-py3-none-any.whl size=207461 sha256=9fd96d1f42d9494dd974d2dffefed3836c6cdd14e8b2f0b41d9ce16bb0201412 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-9wx9bi9x/wheels/02/c7/de/5033d029449c22a9b83300be3e2ad19b398a30ab6f5a94632c Step #3 - "compile-libfuzzer-address-x86_64": Successfully built GitPython Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: smmap, gitdb, GitPython Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed GitPython-3.1.43 gitdb-4.0.11 smmap-5.0.1 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv Step #3 - "compile-libfuzzer-address-x86_64": ++ SEED_DATA_DIR=/src/seed_data Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src/seed_data '(' -name '*_seed_corpus.zip' -o -name '*.options' -o -name '*.dict' ')' '!' '(' -name '__base.*' ')' -exec printf 'Copying: %s\n' '{}' ';' -exec chmod a-x '{}' ';' -exec cp '{}' /workspace/out/libfuzzer-address-x86_64 ';' Step #3 - "compile-libfuzzer-address-x86_64": Copying: /src/seed_data/fuzz_config_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": Copying: /src/seed_data/fuzz_tree_seed_corpus.zip Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src/gitpython/fuzzing -name 'fuzz_*.py' -print0 Step #3 - "compile-libfuzzer-address-x86_64": ++ IFS= Step #3 - "compile-libfuzzer-address-x86_64": ++ read -r -d '' fuzz_harness Step #3 - "compile-libfuzzer-address-x86_64": ++ compile_python_fuzzer /src/gitpython/fuzzing/fuzz-targets/fuzz_config.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/gitpython/fuzzing/fuzz-targets/fuzz_config.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/gitpython/fuzzing/fuzz-targets/fuzz_config.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_config Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_config.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_config Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_config Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_config --onefile --name fuzz_config.pkg /src/gitpython/fuzzing/fuzz-targets/fuzz_config.py Step #3 - "compile-libfuzzer-address-x86_64": 145 INFO: PyInstaller: 6.6.0, contrib hooks: 2024.4 Step #3 - "compile-libfuzzer-address-x86_64": 145 INFO: Python: 3.8.3 Step #3 - "compile-libfuzzer-address-x86_64": 146 INFO: Platform: Linux-5.10.0-28-cloud-amd64-x86_64-with-glibc2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": 147 INFO: wrote /src/gitpython/fuzz_config.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 150 INFO: Extending PYTHONPATH with paths Step #3 - "compile-libfuzzer-address-x86_64": ['/src/gitpython/fuzzing/fuzz-targets'] Step #3 - "compile-libfuzzer-address-x86_64": 278 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 278 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 278 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 278 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 279 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 280 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 292 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 747 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 784 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 2409 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 3429 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3549 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3561 INFO: Using Python shared library: /usr/local/lib/libpython3.8.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3561 INFO: Analyzing /src/gitpython/fuzzing/fuzz-targets/fuzz_config.py Step #3 - "compile-libfuzzer-address-x86_64": 3565 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'... Step #3 - "compile-libfuzzer-address-x86_64": 3928 INFO: Loading module hook 'hook-platform.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4706 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5045 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5702 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5777 INFO: Processing module hooks... Step #3 - "compile-libfuzzer-address-x86_64": 6020 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 6025 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 6034 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 6040 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py' Step #3 - "compile-libfuzzer-address-x86_64": 6042 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py' Step #3 - "compile-libfuzzer-address-x86_64": 6045 INFO: Processing pre-find module path hook _pyi_rth_utils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-_pyi_rth_utils.py'. Step #3 - "compile-libfuzzer-address-x86_64": 6047 INFO: Loading module hook 'hook-_pyi_rth_utils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 6047 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py' Step #3 - "compile-libfuzzer-address-x86_64": 6060 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 6738 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_config/fuzz_config.pkg/warn-fuzz_config.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 6773 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_config/fuzz_config.pkg/xref-fuzz_config.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 6790 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 6790 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6790 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_config/fuzz_config.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 7174 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_config/fuzz_config.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 7194 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 7194 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 7194 INFO: Building PKG (CArchive) fuzz_config.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13847 INFO: Building PKG (CArchive) fuzz_config.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_config.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13850 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 13881 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_config.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_config.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_config.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_config Step #3 - "compile-libfuzzer-address-x86_64": ++ common_base_dictionary_filename=/src/seed_data/__base.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ [[ -r /src/seed_data/__base.dict ]] Step #3 - "compile-libfuzzer-address-x86_64": +++ basename /src/gitpython/fuzzing/fuzz-targets/fuzz_config.py .py Step #3 - "compile-libfuzzer-address-x86_64": ++ fuzz_harness_dictionary_filename=fuzz_config.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ output_file=/workspace/out/libfuzzer-address-x86_64/fuzz_config.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ printf 'Appending %s to %s\n' /src/seed_data/__base.dict /workspace/out/libfuzzer-address-x86_64/fuzz_config.dict Step #3 - "compile-libfuzzer-address-x86_64": Appending /src/seed_data/__base.dict to /workspace/out/libfuzzer-address-x86_64/fuzz_config.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ [[ -s /workspace/out/libfuzzer-address-x86_64/fuzz_config.dict ]] Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/seed_data/__base.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ IFS= Step #3 - "compile-libfuzzer-address-x86_64": ++ read -r -d '' fuzz_harness Step #3 - "compile-libfuzzer-address-x86_64": ++ compile_python_fuzzer /src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_tree Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_tree.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_tree Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_tree Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_tree --onefile --name fuzz_tree.pkg /src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py Step #3 - "compile-libfuzzer-address-x86_64": 142 INFO: PyInstaller: 6.6.0, contrib hooks: 2024.4 Step #3 - "compile-libfuzzer-address-x86_64": 142 INFO: Python: 3.8.3 Step #3 - "compile-libfuzzer-address-x86_64": 143 INFO: Platform: Linux-5.10.0-28-cloud-amd64-x86_64-with-glibc2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": 143 INFO: wrote /src/gitpython/fuzz_tree.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 147 INFO: Extending PYTHONPATH with paths Step #3 - "compile-libfuzzer-address-x86_64": ['/src/gitpython/fuzzing/fuzz-targets'] Step #3 - "compile-libfuzzer-address-x86_64": 274 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 274 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 275 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 275 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 275 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 276 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 287 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 982 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 1058 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 2353 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 3430 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3553 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3565 INFO: Using Python shared library: /usr/local/lib/libpython3.8.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3565 INFO: Analyzing /src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py Step #3 - "compile-libfuzzer-address-x86_64": 3570 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'... Step #3 - "compile-libfuzzer-address-x86_64": 3919 INFO: Loading module hook 'hook-platform.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4702 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5039 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5692 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5767 INFO: Processing module hooks... Step #3 - "compile-libfuzzer-address-x86_64": 6007 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 6012 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 6021 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 6027 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py' Step #3 - "compile-libfuzzer-address-x86_64": 6029 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py' Step #3 - "compile-libfuzzer-address-x86_64": 6033 INFO: Processing pre-find module path hook _pyi_rth_utils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-_pyi_rth_utils.py'. Step #3 - "compile-libfuzzer-address-x86_64": 6034 INFO: Loading module hook 'hook-_pyi_rth_utils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 6035 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py' Step #3 - "compile-libfuzzer-address-x86_64": 6048 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 6729 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_tree/fuzz_tree.pkg/warn-fuzz_tree.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 6765 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_tree/fuzz_tree.pkg/xref-fuzz_tree.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 6782 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 6782 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6782 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_tree/fuzz_tree.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 7169 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_tree/fuzz_tree.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 7188 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 7188 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 7188 INFO: Building PKG (CArchive) fuzz_tree.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13856 INFO: Building PKG (CArchive) fuzz_tree.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 13859 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 13859 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 13859 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 13859 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 13859 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_tree.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13860 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 13920 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_tree.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_tree.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_tree.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_tree Step #3 - "compile-libfuzzer-address-x86_64": ++ common_base_dictionary_filename=/src/seed_data/__base.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ [[ -r /src/seed_data/__base.dict ]] Step #3 - "compile-libfuzzer-address-x86_64": +++ basename /src/gitpython/fuzzing/fuzz-targets/fuzz_tree.py .py Step #3 - "compile-libfuzzer-address-x86_64": ++ fuzz_harness_dictionary_filename=fuzz_tree.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ output_file=/workspace/out/libfuzzer-address-x86_64/fuzz_tree.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ printf 'Appending %s to %s\n' /src/seed_data/__base.dict /workspace/out/libfuzzer-address-x86_64/fuzz_tree.dict Step #3 - "compile-libfuzzer-address-x86_64": Appending /src/seed_data/__base.dict to /workspace/out/libfuzzer-address-x86_64/fuzz_tree.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ [[ -s /workspace/out/libfuzzer-address-x86_64/fuzz_tree.dict ]] Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/seed_data/__base.dict Step #3 - "compile-libfuzzer-address-x86_64": ++ IFS= Step #3 - "compile-libfuzzer-address-x86_64": ++ read -r -d '' fuzz_harness Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": f315fc4a16bf: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 3307b77f93fb: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": b4e2cb88b242: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 8123c1fd49aa: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a9ca5a3a607a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0bfc4aae393a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0595c6e48c06: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 04de1b4af6e6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 77d40881c71a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c57f901960d5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e6c9f7320619: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0e1e5f104dee: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": deb7e6158004: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d957cf4c0340: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ea1ff6505a9b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 750434039c00: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0e1e5f104dee: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0595c6e48c06: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": deb7e6158004: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d957cf4c0340: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 04de1b4af6e6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ea1ff6505a9b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e6c9f7320619: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 750434039c00: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 77d40881c71a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c57f901960d5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0bfc4aae393a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a9ca5a3a607a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a9ca5a3a607a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e2cb88b242: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b4e2cb88b242: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8123c1fd49aa: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 8123c1fd49aa: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0595c6e48c06: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0595c6e48c06: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 04de1b4af6e6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 04de1b4af6e6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e2cb88b242: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 77d40881c71a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 77d40881c71a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e6c9f7320619: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e6c9f7320619: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 8123c1fd49aa: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c57f901960d5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c57f901960d5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a9ca5a3a607a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": deb7e6158004: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": deb7e6158004: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d957cf4c0340: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d957cf4c0340: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0bfc4aae393a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0bfc4aae393a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 750434039c00: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 750434039c00: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e1e5f104dee: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0e1e5f104dee: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ea1ff6505a9b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ea1ff6505a9b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0bfc4aae393a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0595c6e48c06: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 04de1b4af6e6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 77d40881c71a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c57f901960d5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e6c9f7320619: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e1e5f104dee: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": deb7e6158004: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d957cf4c0340: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ea1ff6505a9b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 750434039c00: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:0c4557a72d234b1eb4266914ca39fa2280aad1619924763e1127ffdd55235576 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4qmar8f6/fuzz_tree Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4qmar8f6/fuzz_config Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/gitpython Step #6: adding: fuzz_config (deflated 31%) Step #6: adding: fuzz_config.dict (deflated 49%) Step #6: adding: fuzz_config.pkg (deflated 1%) Step #6: adding: fuzz_config_seed_corpus.zip (stored 0%) Step #6: adding: fuzz_tree (deflated 31%) Step #6: adding: fuzz_tree.dict (deflated 49%) Step #6: adding: fuzz_tree.pkg (deflated 1%) Step #6: adding: fuzz_tree_seed_corpus.zip (stored 0%) Step #6: adding: llvm-symbolizer (deflated 64%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 66%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 167 0 0 100 167 0 709 --:--:-- --:--:-- --:--:-- 710 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 38.2M 0 0 100 38.2M 0 62.8M --:--:-- --:--:-- --:--:-- 62.8M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 22 0 0 100 22 0 61 --:--:-- --:--:-- --:--:-- 61 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 34 0 0 100 34 0 142 --:--:-- --:--:-- --:--:-- 143 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/gitpython Finished Step #11 PUSH DONE