starting build "3cb82540-2d80-4d60-b1eb-e8ebde322d9b"

FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon  8.192kB

Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-python
Step #1: latest: Pulling from oss-fuzz-base/base-builder-python
Step #1: b549f31133a9: Pulling fs layer
Step #1: 6a031355e5a4: Pulling fs layer
Step #1: 0b72f79bb618: Pulling fs layer
Step #1: 90335b886515: Pulling fs layer
Step #1: 4acfddd8e55d: Pulling fs layer
Step #1: e7da934767ce: Pulling fs layer
Step #1: ca48cdf3983f: Pulling fs layer
Step #1: 7dbcdbf5d55f: Pulling fs layer
Step #1: 50e9c68d34ea: Pulling fs layer
Step #1: 4e836e3eed39: Pulling fs layer
Step #1: 4b5040227f1e: Pulling fs layer
Step #1: d3fb02ed4540: Pulling fs layer
Step #1: 90335b886515: Waiting
Step #1: 4acfddd8e55d: Waiting
Step #1: 1f5f6d4a864c: Pulling fs layer
Step #1: fac93c045c91: Pulling fs layer
Step #1: 8846363f4f98: Pulling fs layer
Step #1: 625645c62835: Pulling fs layer
Step #1: ef05bcbd095c: Pulling fs layer
Step #1: c3f48f44c27e: Pulling fs layer
Step #1: 534e4ce04141: Pulling fs layer
Step #1: e7da934767ce: Waiting
Step #1: bcc4f22e74eb: Pulling fs layer
Step #1: b92dd1a5cf6c: Pulling fs layer
Step #1: ca48cdf3983f: Waiting
Step #1: b4e67ac51e1a: Pulling fs layer
Step #1: 7dbcdbf5d55f: Waiting
Step #1: 1dd8dea6f287: Pulling fs layer
Step #1: 9db7b76f6a4a: Pulling fs layer
Step #1: 50e9c68d34ea: Waiting
Step #1: 4e2c795fe7b7: Pulling fs layer
Step #1: 4e836e3eed39: Waiting
Step #1: 8a57f4724c32: Pulling fs layer
Step #1: 4b5040227f1e: Waiting
Step #1: d3fb02ed4540: Waiting
Step #1: 73ce5d51499a: Pulling fs layer
Step #1: 1f5f6d4a864c: Waiting
Step #1: c3f48f44c27e: Waiting
Step #1: 66494ca4c4bd: Pulling fs layer
Step #1: fac93c045c91: Waiting
Step #1: 86951b715a9f: Pulling fs layer
Step #1: 534e4ce04141: Waiting
Step #1: 5dda498c2b68: Pulling fs layer
Step #1: 8846363f4f98: Waiting
Step #1: bcc4f22e74eb: Waiting
Step #1: 72501b17dd43: Pulling fs layer
Step #1: 625645c62835: Waiting
Step #1: b92dd1a5cf6c: Waiting
Step #1: ef05bcbd095c: Waiting
Step #1: b4e67ac51e1a: Waiting
Step #1: 1dd8dea6f287: Waiting
Step #1: 9db7b76f6a4a: Waiting
Step #1: 5dda498c2b68: Waiting
Step #1: 86951b715a9f: Waiting
Step #1: 4e2c795fe7b7: Waiting
Step #1: 72501b17dd43: Waiting
Step #1: 8a57f4724c32: Waiting
Step #1: 73ce5d51499a: Waiting
Step #1: 0b72f79bb618: Verifying Checksum
Step #1: 0b72f79bb618: Download complete
Step #1: b549f31133a9: Verifying Checksum
Step #1: b549f31133a9: Download complete
Step #1: 4acfddd8e55d: Download complete
Step #1: e7da934767ce: Download complete
Step #1: 90335b886515: Verifying Checksum
Step #1: 90335b886515: Download complete
Step #1: 7dbcdbf5d55f: Verifying Checksum
Step #1: 7dbcdbf5d55f: Download complete
Step #1: 6a031355e5a4: Verifying Checksum
Step #1: 6a031355e5a4: Download complete
Step #1: 50e9c68d34ea: Verifying Checksum
Step #1: 50e9c68d34ea: Download complete
Step #1: 4b5040227f1e: Verifying Checksum
Step #1: 4b5040227f1e: Download complete
Step #1: d3fb02ed4540: Verifying Checksum
Step #1: d3fb02ed4540: Download complete
Step #1: 1f5f6d4a864c: Verifying Checksum
Step #1: 1f5f6d4a864c: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: fac93c045c91: Verifying Checksum
Step #1: fac93c045c91: Download complete
Step #1: 8846363f4f98: Verifying Checksum
Step #1: 8846363f4f98: Download complete
Step #1: 625645c62835: Verifying Checksum
Step #1: 625645c62835: Download complete
Step #1: ef05bcbd095c: Verifying Checksum
Step #1: ef05bcbd095c: Download complete
Step #1: c3f48f44c27e: Verifying Checksum
Step #1: c3f48f44c27e: Download complete
Step #1: 534e4ce04141: Verifying Checksum
Step #1: 534e4ce04141: Download complete
Step #1: bcc4f22e74eb: Verifying Checksum
Step #1: bcc4f22e74eb: Download complete
Step #1: b92dd1a5cf6c: Verifying Checksum
Step #1: b92dd1a5cf6c: Download complete
Step #1: b4e67ac51e1a: Verifying Checksum
Step #1: b4e67ac51e1a: Download complete
Step #1: 1dd8dea6f287: Verifying Checksum
Step #1: 1dd8dea6f287: Download complete
Step #1: 4e836e3eed39: Verifying Checksum
Step #1: 4e836e3eed39: Download complete
Step #1: 9db7b76f6a4a: Verifying Checksum
Step #1: 9db7b76f6a4a: Download complete
Step #1: 4e2c795fe7b7: Verifying Checksum
Step #1: 4e2c795fe7b7: Download complete
Step #1: 8a57f4724c32: Verifying Checksum
Step #1: 8a57f4724c32: Download complete
Step #1: 66494ca4c4bd: Verifying Checksum
Step #1: 66494ca4c4bd: Download complete
Step #1: 73ce5d51499a: Verifying Checksum
Step #1: 73ce5d51499a: Download complete
Step #1: 5dda498c2b68: Download complete
Step #1: 86951b715a9f: Verifying Checksum
Step #1: 86951b715a9f: Download complete
Step #1: ca48cdf3983f: Verifying Checksum
Step #1: ca48cdf3983f: Download complete
Step #1: 72501b17dd43: Verifying Checksum
Step #1: 72501b17dd43: Download complete
Step #1: 6a031355e5a4: Pull complete
Step #1: 0b72f79bb618: Pull complete
Step #1: 90335b886515: Pull complete
Step #1: 4acfddd8e55d: Pull complete
Step #1: e7da934767ce: Pull complete
Step #1: ca48cdf3983f: Pull complete
Step #1: 7dbcdbf5d55f: Pull complete
Step #1: 50e9c68d34ea: Pull complete
Step #1: 4e836e3eed39: Pull complete
Step #1: 4b5040227f1e: Pull complete
Step #1: d3fb02ed4540: Pull complete
Step #1: 1f5f6d4a864c: Pull complete
Step #1: fac93c045c91: Pull complete
Step #1: 8846363f4f98: Pull complete
Step #1: 625645c62835: Pull complete
Step #1: ef05bcbd095c: Pull complete
Step #1: c3f48f44c27e: Pull complete
Step #1: 534e4ce04141: Pull complete
Step #1: bcc4f22e74eb: Pull complete
Step #1: b92dd1a5cf6c: Pull complete
Step #1: b4e67ac51e1a: Pull complete
Step #1: 1dd8dea6f287: Pull complete
Step #1: 9db7b76f6a4a: Pull complete
Step #1: 4e2c795fe7b7: Pull complete
Step #1: 8a57f4724c32: Pull complete
Step #1: 73ce5d51499a: Pull complete
Step #1: 66494ca4c4bd: Pull complete
Step #1: 86951b715a9f: Pull complete
Step #1: 5dda498c2b68: Pull complete
Step #1: 72501b17dd43: Pull complete
Step #1: Digest: sha256:6f10567fc17a5bd937b2a39cd68cbb8113fb1e8cd1ca1a2902cf5a922cd213e1
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest
Step #1:  ---> 3ec97add7279
Step #1: Step 2/4 : RUN git clone https://github.com/gitpython-developers/gitdb gitdb
Step #1:  ---> Running in 50f9b1f316c0
Step #1: Cloning into 'gitdb'...
Step #1: Removing intermediate container 50f9b1f316c0
Step #1:  ---> 1b5267fe4ca2
Step #1: Step 3/4 : COPY *.sh *py $SRC/
Step #1:  ---> 8b0d7f860a4a
Step #1: Step 4/4 : WORKDIR $SRC/gitdb
Step #1:  ---> Running in 2c794c1ebc0f
Step #1: Removing intermediate container 2c794c1ebc0f
Step #1:  ---> ed2d00d2764e
Step #1: Successfully built ed2d00d2764e
Step #1: Successfully tagged gcr.io/oss-fuzz/gitdb:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gitdb
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/filenQyj3P
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ python == \g\o ]]
Step #2 - "srcmap": ++ find /src -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/gitdb/.git
Step #2 - "srcmap": + GIT_DIR=/src/gitdb
Step #2 - "srcmap": + cd /src/gitdb
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/gitpython-developers/gitdb
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=b6539232ab73fa4ad37fe63131c1cbc671b462e7
Step #2 - "srcmap": + jq_inplace /tmp/filenQyj3P '."/src/gitdb" = { type: "git", url: "https://github.com/gitpython-developers/gitdb", rev: "b6539232ab73fa4ad37fe63131c1cbc671b462e7" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileeDRinb
Step #2 - "srcmap": + cat /tmp/filenQyj3P
Step #2 - "srcmap": + jq '."/src/gitdb" = { type: "git", url: "https://github.com/gitpython-developers/gitdb", rev: "b6539232ab73fa4ad37fe63131c1cbc671b462e7" }'
Step #2 - "srcmap": + mv /tmp/fileeDRinb /tmp/filenQyj3P
Step #2 - "srcmap": ++ find /src -name .svn -type d
Step #2 - "srcmap": ++ find /src -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/filenQyj3P
Step #2 - "srcmap": + rm /tmp/filenQyj3P
Step #2 - "srcmap": {
Step #2 - "srcmap":   "/src/gitdb": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/gitpython-developers/gitdb",
Step #2 - "srcmap":     "rev": "b6539232ab73fa4ad37fe63131c1cbc671b462e7"
Step #2 - "srcmap":   }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-address-x86_64"
Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-address-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #3 - "compile-libfuzzer-address-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-address-x86_64": CC=clang
Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++
Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr,
Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr
Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers
Step #3 - "compile-libfuzzer-address-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-address-x86_64": + pip3 install .
Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/gitdb
Step #3 - "compile-libfuzzer-address-x86_64": Collecting smmap<6,>=3.0.1 (from gitdb==4.0.11)
Step #3 - "compile-libfuzzer-address-x86_64":   Downloading https://files.pythonhosted.org/packages/a7/a5/10f97f73544edcdef54409f1d839f6049a0d79df68adbc1ceb24d1aaca42/smmap-5.0.1-py3-none-any.whl
Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: smmap, gitdb
Step #3 - "compile-libfuzzer-address-x86_64":   Running setup.py install for gitdb ... [?25l- done
Step #3 - "compile-libfuzzer-address-x86_64": [?25hSuccessfully installed gitdb-4.0.11 smmap-5.0.1
Step #3 - "compile-libfuzzer-address-x86_64": WARNING: You are using pip version 19.2.3, however version 23.3.1 is available.
Step #3 - "compile-libfuzzer-address-x86_64": You should consider upgrading via the 'pip install --upgrade pip' command.
Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py'
Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py')
Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_gitdb.py
Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_gitdb.py
Step #3 - "compile-libfuzzer-address-x86_64": + shift 1
Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_gitdb.py
Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_gitdb
Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_gitdb.pkg
Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/
Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_gitdb
Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]]
Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]]
Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]]
Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/
Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_gitdb
Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_gitdb --onefile --name fuzz_gitdb.pkg /src/fuzz_gitdb.py
Step #3 - "compile-libfuzzer-address-x86_64": 61 INFO: PyInstaller: 5.0.1
Step #3 - "compile-libfuzzer-address-x86_64": 61 INFO: Python: 3.8.3
Step #3 - "compile-libfuzzer-address-x86_64": 62 INFO: Platform: Linux-5.10.0-26-cloud-amd64-x86_64-with-glibc2.2.5
Step #3 - "compile-libfuzzer-address-x86_64": 63 INFO: wrote /src/gitdb/fuzz_gitdb.pkg.spec
Step #3 - "compile-libfuzzer-address-x86_64": 65 INFO: UPX is not available.
Step #3 - "compile-libfuzzer-address-x86_64": 67 INFO: Extending PYTHONPATH with paths
Step #3 - "compile-libfuzzer-address-x86_64": ['/src']
Step #3 - "compile-libfuzzer-address-x86_64": 246 INFO: checking Analysis
Step #3 - "compile-libfuzzer-address-x86_64": 246 INFO: Building Analysis because Analysis-00.toc is non existent
Step #3 - "compile-libfuzzer-address-x86_64": 246 INFO: Initializing module dependency graph...
Step #3 - "compile-libfuzzer-address-x86_64": 248 INFO: Caching module graph hooks...
Step #3 - "compile-libfuzzer-address-x86_64": 258 INFO: Analyzing base_library.zip ...
Step #3 - "compile-libfuzzer-address-x86_64": 2789 INFO: Processing pre-find module path hook distutils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-distutils.py'.
Step #3 - "compile-libfuzzer-address-x86_64": 2790 INFO: distutils: retargeting to non-venv dir '/usr/local/lib/python3.8'
Step #3 - "compile-libfuzzer-address-x86_64": 5169 INFO: Caching module dependency graph...
Step #3 - "compile-libfuzzer-address-x86_64": 5326 INFO: running Analysis Analysis-00.toc
Step #3 - "compile-libfuzzer-address-x86_64": 5354 INFO: Analyzing /src/fuzz_gitdb.py
Step #3 - "compile-libfuzzer-address-x86_64": 5603 INFO: Processing module hooks...
Step #3 - "compile-libfuzzer-address-x86_64": 5604 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'...
Step #3 - "compile-libfuzzer-address-x86_64": 5605 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5607 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5608 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5609 INFO: Loading module hook 'hook-distutils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5619 INFO: Loading module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5619 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5621 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5673 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #3 - "compile-libfuzzer-address-x86_64": 5924 INFO: Looking for ctypes DLLs
Step #3 - "compile-libfuzzer-address-x86_64": 5928 INFO: Analyzing run-time hooks ...
Step #3 - "compile-libfuzzer-address-x86_64": 5932 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_subprocess.py'
Step #3 - "compile-libfuzzer-address-x86_64": 5934 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py'
Step #3 - "compile-libfuzzer-address-x86_64": 5936 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py'
Step #3 - "compile-libfuzzer-address-x86_64": 5939 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py'
Step #3 - "compile-libfuzzer-address-x86_64": 5948 INFO: Looking for dynamic libraries
Step #3 - "compile-libfuzzer-address-x86_64": 6890 INFO: Looking for eggs
Step #3 - "compile-libfuzzer-address-x86_64": 6890 INFO: Using Python library /usr/local/lib/libpython3.8.so.1.0
Step #3 - "compile-libfuzzer-address-x86_64": 6894 INFO: Warnings written to /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/warn-fuzz_gitdb.pkg.txt
Step #3 - "compile-libfuzzer-address-x86_64": 6924 INFO: Graph cross-reference written to /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/xref-fuzz_gitdb.pkg.html
Step #3 - "compile-libfuzzer-address-x86_64": 6938 INFO: checking PYZ
Step #3 - "compile-libfuzzer-address-x86_64": 6939 INFO: Building PYZ because PYZ-00.toc is non existent
Step #3 - "compile-libfuzzer-address-x86_64": 6939 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/PYZ-00.pyz
Step #3 - "compile-libfuzzer-address-x86_64": 7388 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/PYZ-00.pyz completed successfully.
Step #3 - "compile-libfuzzer-address-x86_64": 7392 INFO: checking PKG
Step #3 - "compile-libfuzzer-address-x86_64": 7393 INFO: Building PKG because PKG-00.toc is non existent
Step #3 - "compile-libfuzzer-address-x86_64": 7393 INFO: Building PKG (CArchive) fuzz_gitdb.pkg.pkg
Step #3 - "compile-libfuzzer-address-x86_64": 14185 INFO: Building PKG (CArchive) fuzz_gitdb.pkg.pkg completed successfully.
Step #3 - "compile-libfuzzer-address-x86_64": 14188 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run
Step #3 - "compile-libfuzzer-address-x86_64": 14188 INFO: checking EXE
Step #3 - "compile-libfuzzer-address-x86_64": 14189 INFO: Building EXE because EXE-00.toc is non existent
Step #3 - "compile-libfuzzer-address-x86_64": 14189 INFO: Building EXE from EXE-00.toc
Step #3 - "compile-libfuzzer-address-x86_64": 14189 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_gitdb.pkg
Step #3 - "compile-libfuzzer-address-x86_64": 14189 INFO: Appending PKG archive to custom ELF section in EXE
Step #3 - "compile-libfuzzer-address-x86_64": 14282 INFO: Building EXE from EXE-00.toc completed successfully.
Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_gitdb.pkg
Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]]
Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh
Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection.
Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0")
Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_gitdb.pkg
Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_gitdb.pkg $@'
Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_gitdb
Finished Step #3 - "compile-libfuzzer-address-x86_64"
Starting Step #4 - "build-check-libfuzzer-address-x86_64"
Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally
Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner
Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists
Step #4 - "build-check-libfuzzer-address-x86_64": 6a031355e5a4: Already exists
Step #4 - "build-check-libfuzzer-address-x86_64": 0b72f79bb618: Already exists
Step #4 - "build-check-libfuzzer-address-x86_64": 48309ce267bd: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": e09ac2b3f6b3: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 39a0c0d1e290: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 91adbb310e8d: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": ed6b3c326a1b: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 73bd6cab534e: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": b190278ad3f4: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 49123a15c4e4: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": abf664782093: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 5e2f00bf0c5d: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": cd7076eedf06: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": b97d83ac024a: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": ba3c82927d90: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 893e25d78a25: Pulling fs layer
Step #4 - "build-check-libfuzzer-address-x86_64": 5e2f00bf0c5d: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": 49123a15c4e4: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": cd7076eedf06: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": b97d83ac024a: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": ba3c82927d90: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": 893e25d78a25: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": 73bd6cab534e: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": b190278ad3f4: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": abf664782093: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": 91adbb310e8d: Waiting
Step #4 - "build-check-libfuzzer-address-x86_64": 39a0c0d1e290: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": 39a0c0d1e290: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 48309ce267bd: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": e09ac2b3f6b3: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": e09ac2b3f6b3: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 73bd6cab534e: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": ed6b3c326a1b: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": ed6b3c326a1b: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": b190278ad3f4: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 48309ce267bd: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": abf664782093: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 49123a15c4e4: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": 49123a15c4e4: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": e09ac2b3f6b3: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": cd7076eedf06: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": cd7076eedf06: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 39a0c0d1e290: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": b97d83ac024a: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": b97d83ac024a: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 91adbb310e8d: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": 91adbb310e8d: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 893e25d78a25: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": ba3c82927d90: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": ba3c82927d90: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 5e2f00bf0c5d: Verifying Checksum
Step #4 - "build-check-libfuzzer-address-x86_64": 5e2f00bf0c5d: Download complete
Step #4 - "build-check-libfuzzer-address-x86_64": 91adbb310e8d: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": ed6b3c326a1b: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": 73bd6cab534e: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": b190278ad3f4: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": 49123a15c4e4: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": abf664782093: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": 5e2f00bf0c5d: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": cd7076eedf06: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": b97d83ac024a: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": ba3c82927d90: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": 893e25d78a25: Pull complete
Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:fbb9b29ba3f99c35318014bc039cdf4fc83059de2500c89832cce3d2d5cc98c7
Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpgrncpldb/fuzz_gitdb
Finished Step #4 - "build-check-libfuzzer-address-x86_64"
Starting Step #5
Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Finished Step #5
Starting Step #6
Step #6: Already have image: gcr.io/oss-fuzz/gitdb
Step #6:   adding: fuzz_gitdb (deflated 32%)
Step #6:   adding: fuzz_gitdb.pkg (deflated 1%)
Step #6:   adding: llvm-symbolizer (deflated 64%)
Step #6:   adding: sanitizer_with_fuzzer.so (deflated 66%)
Finished Step #6
Starting Step #7
Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader
Step #7: Using default tag: latest
Step #7: latest: Pulling from oss-fuzz-base/uploader
Step #7: c62795f78da9: Pulling fs layer
Step #7: d4fceeeb758e: Pulling fs layer
Step #7: 5c9125a401ae: Pulling fs layer
Step #7: 0062f774e994: Pulling fs layer
Step #7: 6b33fd031fac: Pulling fs layer
Step #7: 7eb39101e508: Pulling fs layer
Step #7: 89257482f398: Pulling fs layer
Step #7: 0062f774e994: Waiting
Step #7: 7eb39101e508: Waiting
Step #7: 89257482f398: Waiting
Step #7: 6b33fd031fac: Waiting
Step #7: 5c9125a401ae: Verifying Checksum
Step #7: 5c9125a401ae: Download complete
Step #7: d4fceeeb758e: Verifying Checksum
Step #7: 0062f774e994: Verifying Checksum
Step #7: 0062f774e994: Download complete
Step #7: 6b33fd031fac: Download complete
Step #7: 89257482f398: Verifying Checksum
Step #7: 89257482f398: Download complete
Step #7: c62795f78da9: Verifying Checksum
Step #7: c62795f78da9: Download complete
Step #7: 7eb39101e508: Verifying Checksum
Step #7: 7eb39101e508: Download complete
Step #7: c62795f78da9: Pull complete
Step #7: d4fceeeb758e: Pull complete
Step #7: 5c9125a401ae: Pull complete
Step #7: 0062f774e994: Pull complete
Step #7: 6b33fd031fac: Pull complete
Step #7: 7eb39101e508: Pull complete
Step #7: 89257482f398: Pull complete
Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411
Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest
Step #7: gcr.io/oss-fuzz-base/uploader:latest
Step #7:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #7:                                  Dload  Upload   Total   Spent    Left  Speed
Step #7: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   159    0     0  100   159      0    731 --:--:-- --:--:-- --:--:--   732
Finished Step #7
Starting Step #8
Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader
Step #8:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #8:                                  Dload  Upload   Total   Spent    Left  Speed
Step #8: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100 19.9M    0     0  100 19.9M      0  51.8M --:--:-- --:--:-- --:--:-- 51.8M
Finished Step #8
Starting Step #9
Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader
Step #9:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #9:                                  Dload  Upload   Total   Spent    Left  Speed
Step #9: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100    11    0     0  100    11      0     42 --:--:-- --:--:-- --:--:--    42
Finished Step #9
Starting Step #10
Step #10: Already have image (with digest): gcr.io/cloud-builders/curl
Step #10:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #10:                                  Dload  Upload   Total   Spent    Left  Speed
Step #10: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100    30    0     0  100    30      0    153 --:--:-- --:--:-- --:--:--   153
Finished Step #10
Starting Step #11
Step #11: Already have image: gcr.io/oss-fuzz/gitdb
Finished Step #11
Starting Step #12 - "compile-libfuzzer-undefined-x86_64"
Step #12 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #12 - "compile-libfuzzer-undefined-x86_64": ---------------------------------------------------------------
Step #12 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #12 - "compile-libfuzzer-undefined-x86_64": ---------------------------------------------------------------
Step #12 - "compile-libfuzzer-undefined-x86_64": CC=clang
Step #12 - "compile-libfuzzer-undefined-x86_64": CXX=clang++
Step #12 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr,
Step #12 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,float-divide-by-zero,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr
Step #12 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers
Step #12 - "compile-libfuzzer-undefined-x86_64": ---------------------------------------------------------------
Step #12 - "compile-libfuzzer-undefined-x86_64": + pip3 install .
Step #12 - "compile-libfuzzer-undefined-x86_64": Processing /src/gitdb
Step #12 - "compile-libfuzzer-undefined-x86_64": Collecting smmap<6,>=3.0.1 (from gitdb==4.0.11)
Step #12 - "compile-libfuzzer-undefined-x86_64":   Downloading https://files.pythonhosted.org/packages/a7/a5/10f97f73544edcdef54409f1d839f6049a0d79df68adbc1ceb24d1aaca42/smmap-5.0.1-py3-none-any.whl
Step #12 - "compile-libfuzzer-undefined-x86_64": Installing collected packages: smmap, gitdb
Step #12 - "compile-libfuzzer-undefined-x86_64":   Running setup.py install for gitdb ... [?25l- done
Step #12 - "compile-libfuzzer-undefined-x86_64": [?25hSuccessfully installed gitdb-4.0.11 smmap-5.0.1
Step #12 - "compile-libfuzzer-undefined-x86_64": WARNING: You are using pip version 19.2.3, however version 23.3.1 is available.
Step #12 - "compile-libfuzzer-undefined-x86_64": You should consider upgrading via the 'pip install --upgrade pip' command.
Step #12 - "compile-libfuzzer-undefined-x86_64": ++ find /src -name 'fuzz_*.py'
Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py')
Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_gitdb.py
Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_gitdb.py
Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1
Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_gitdb.py
Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_gitdb
Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_gitdb.pkg
Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/
Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_gitdb
Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]]
Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]]
Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]]
Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/
Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_gitdb
Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_gitdb --onefile --name fuzz_gitdb.pkg /src/fuzz_gitdb.py
Step #12 - "compile-libfuzzer-undefined-x86_64": 61 INFO: PyInstaller: 5.0.1
Step #12 - "compile-libfuzzer-undefined-x86_64": 61 INFO: Python: 3.8.3
Step #12 - "compile-libfuzzer-undefined-x86_64": 62 INFO: Platform: Linux-5.10.0-26-cloud-amd64-x86_64-with-glibc2.2.5
Step #12 - "compile-libfuzzer-undefined-x86_64": 63 INFO: wrote /src/gitdb/fuzz_gitdb.pkg.spec
Step #12 - "compile-libfuzzer-undefined-x86_64": 66 INFO: UPX is not available.
Step #12 - "compile-libfuzzer-undefined-x86_64": 67 INFO: Extending PYTHONPATH with paths
Step #12 - "compile-libfuzzer-undefined-x86_64": ['/src']
Step #12 - "compile-libfuzzer-undefined-x86_64": 249 INFO: checking Analysis
Step #12 - "compile-libfuzzer-undefined-x86_64": 249 INFO: Building Analysis because Analysis-00.toc is non existent
Step #12 - "compile-libfuzzer-undefined-x86_64": 249 INFO: Initializing module dependency graph...
Step #12 - "compile-libfuzzer-undefined-x86_64": 251 INFO: Caching module graph hooks...
Step #12 - "compile-libfuzzer-undefined-x86_64": 261 INFO: Analyzing base_library.zip ...
Step #12 - "compile-libfuzzer-undefined-x86_64": 3071 INFO: Processing pre-find module path hook distutils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-distutils.py'.
Step #12 - "compile-libfuzzer-undefined-x86_64": 3072 INFO: distutils: retargeting to non-venv dir '/usr/local/lib/python3.8'
Step #12 - "compile-libfuzzer-undefined-x86_64": 4829 INFO: Caching module dependency graph...
Step #12 - "compile-libfuzzer-undefined-x86_64": 4986 INFO: running Analysis Analysis-00.toc
Step #12 - "compile-libfuzzer-undefined-x86_64": 5013 INFO: Analyzing /src/fuzz_gitdb.py
Step #12 - "compile-libfuzzer-undefined-x86_64": 5247 INFO: Processing module hooks...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5248 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5249 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5250 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5252 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5253 INFO: Loading module hook 'hook-distutils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5263 INFO: Loading module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5263 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5264 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5315 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5581 INFO: Looking for ctypes DLLs
Step #12 - "compile-libfuzzer-undefined-x86_64": 5586 INFO: Analyzing run-time hooks ...
Step #12 - "compile-libfuzzer-undefined-x86_64": 5590 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_subprocess.py'
Step #12 - "compile-libfuzzer-undefined-x86_64": 5591 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py'
Step #12 - "compile-libfuzzer-undefined-x86_64": 5594 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py'
Step #12 - "compile-libfuzzer-undefined-x86_64": 5597 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py'
Step #12 - "compile-libfuzzer-undefined-x86_64": 5605 INFO: Looking for dynamic libraries
Step #12 - "compile-libfuzzer-undefined-x86_64": 6539 INFO: Looking for eggs
Step #12 - "compile-libfuzzer-undefined-x86_64": 6539 INFO: Using Python library /usr/local/lib/libpython3.8.so.1.0
Step #12 - "compile-libfuzzer-undefined-x86_64": 6543 INFO: Warnings written to /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/warn-fuzz_gitdb.pkg.txt
Step #12 - "compile-libfuzzer-undefined-x86_64": 6573 INFO: Graph cross-reference written to /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/xref-fuzz_gitdb.pkg.html
Step #12 - "compile-libfuzzer-undefined-x86_64": 6589 INFO: checking PYZ
Step #12 - "compile-libfuzzer-undefined-x86_64": 6589 INFO: Building PYZ because PYZ-00.toc is non existent
Step #12 - "compile-libfuzzer-undefined-x86_64": 6589 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/PYZ-00.pyz
Step #12 - "compile-libfuzzer-undefined-x86_64": 7021 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_gitdb/fuzz_gitdb.pkg/PYZ-00.pyz completed successfully.
Step #12 - "compile-libfuzzer-undefined-x86_64": 7026 INFO: checking PKG
Step #12 - "compile-libfuzzer-undefined-x86_64": 7026 INFO: Building PKG because PKG-00.toc is non existent
Step #12 - "compile-libfuzzer-undefined-x86_64": 7027 INFO: Building PKG (CArchive) fuzz_gitdb.pkg.pkg
Step #12 - "compile-libfuzzer-undefined-x86_64": 13838 INFO: Building PKG (CArchive) fuzz_gitdb.pkg.pkg completed successfully.
Step #12 - "compile-libfuzzer-undefined-x86_64": 13841 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run
Step #12 - "compile-libfuzzer-undefined-x86_64": 13841 INFO: checking EXE
Step #12 - "compile-libfuzzer-undefined-x86_64": 13841 INFO: Building EXE because EXE-00.toc is non existent
Step #12 - "compile-libfuzzer-undefined-x86_64": 13842 INFO: Building EXE from EXE-00.toc
Step #12 - "compile-libfuzzer-undefined-x86_64": 13842 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_gitdb.pkg
Step #12 - "compile-libfuzzer-undefined-x86_64": 13842 INFO: Appending PKG archive to custom ELF section in EXE
Step #12 - "compile-libfuzzer-undefined-x86_64": 13914 INFO: Building EXE from EXE-00.toc completed successfully.
Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_gitdb.pkg
Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]]
Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh
Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection.
Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0")
Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_gitdb.pkg
Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_gitdb.pkg $@'
Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_gitdb
Finished Step #12 - "compile-libfuzzer-undefined-x86_64"
Starting Step #13 - "build-check-libfuzzer-undefined-x86_64"
Step #13 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpxsm1uzky/fuzz_gitdb
Finished Step #13 - "build-check-libfuzzer-undefined-x86_64"
Starting Step #14
Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Finished Step #14
Starting Step #15
Step #15: Already have image: gcr.io/oss-fuzz/gitdb
Step #15:   adding: fuzz_gitdb (deflated 32%)
Step #15:   adding: fuzz_gitdb.pkg (deflated 1%)
Step #15:   adding: llvm-symbolizer (deflated 64%)
Step #15:   adding: sanitizer_with_fuzzer.so (deflated 64%)
Finished Step #15
Starting Step #16
Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader
Step #16:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #16:                                  Dload  Upload   Total   Spent    Left  Speed
Step #16: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   159    0     0  100   159      0    728 --:--:-- --:--:-- --:--:--   726
Finished Step #16
Starting Step #17
Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader
Step #17:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #17:                                  Dload  Upload   Total   Spent    Left  Speed
Step #17: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
 85 19.4M    0     0   85 16.7M      0  86.2M --:--:-- --:--:-- --:--:-- 86.0M
100 19.4M    0     0  100 19.4M      0  48.9M --:--:-- --:--:-- --:--:-- 48.9M
Finished Step #17
Starting Step #18
Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader
Step #18:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #18:                                  Dload  Upload   Total   Spent    Left  Speed
Step #18: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100    11    0     0  100    11      0     53 --:--:-- --:--:-- --:--:--    53
100    11    0     0  100    11      0     44 --:--:-- --:--:-- --:--:--    44
Finished Step #18
Starting Step #19
Step #19: Already have image (with digest): gcr.io/cloud-builders/curl
Step #19: 
Step #19:                    ***** NOTICE *****
Step #19: 
Step #19: Supported `curl` versions can be found in the various images available at
Step #19: https://console.cloud.google.com/launcher/details/google/ubuntu1604.
Step #19: 
Step #19:                 ***** END OF NOTICE *****
Step #19: 
Step #19:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #19:                                  Dload  Upload   Total   Spent    Left  Speed
Step #19: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100    32    0     0  100    32      0    142 --:--:-- --:--:-- --:--:--   142
Finished Step #19
Starting Step #20
Step #20: Already have image: gcr.io/oss-fuzz/gitdb
Finished Step #20
PUSH
DONE