starting build "4993f644-0976-4c49-903e-76ed222e8969" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 5.632kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-rust Step #1: latest: Pulling from oss-fuzz-base/base-builder-rust Step #1: b549f31133a9: Pulling fs layer Step #1: 27a60affb188: Pulling fs layer Step #1: fe996ae7dc59: Pulling fs layer Step #1: 87e0e48e0cd6: Pulling fs layer Step #1: f835b9e0cf1c: Pulling fs layer Step #1: af789c137254: Pulling fs layer Step #1: aff0ac00717e: Pulling fs layer Step #1: 3b1039f9896d: Pulling fs layer Step #1: 03589768b946: Pulling fs layer Step #1: f835b9e0cf1c: Waiting Step #1: 476467ef4fc6: Pulling fs layer Step #1: af789c137254: Waiting Step #1: 3c766dd49ffb: Pulling fs layer Step #1: cfbfe91f834e: Pulling fs layer Step #1: 0b187dafa8d3: Pulling fs layer Step #1: 345ac71c4767: Pulling fs layer Step #1: 7eadecc7791c: Pulling fs layer Step #1: dde9b3807101: Pulling fs layer Step #1: aa322f9d5179: Pulling fs layer Step #1: ed7ec7eeb8fb: Pulling fs layer Step #1: fcd3b4f5fe45: Pulling fs layer Step #1: 88e3f27d7c68: Pulling fs layer Step #1: 84249ace8dd9: Pulling fs layer Step #1: b48628b9660b: Pulling fs layer Step #1: 560589aab225: Pulling fs layer Step #1: 8049d1ac7afb: Pulling fs layer Step #1: 87e0e48e0cd6: Waiting Step #1: 9ca13435c3d5: Pulling fs layer Step #1: bdf125cfc8ec: Pulling fs layer Step #1: 479b0a7911fe: Pulling fs layer Step #1: dde9b3807101: Waiting Step #1: 345ac71c4767: Waiting Step #1: aa322f9d5179: Waiting Step #1: b33bd0575475: Pulling fs layer Step #1: 58dcb60388c1: Pulling fs layer Step #1: b8e63fb00ce7: Pulling fs layer Step #1: 560589aab225: Waiting Step #1: d8ea79b21b9a: Pulling fs layer Step #1: fcd3b4f5fe45: Waiting Step #1: ed7ec7eeb8fb: Waiting Step #1: 84249ace8dd9: Waiting Step #1: 74524f23875e: Pulling fs layer Step #1: 8049d1ac7afb: Waiting Step #1: 8a3a946d5a7c: Pulling fs layer Step #1: 3b1039f9896d: Waiting Step #1: b48628b9660b: Waiting Step #1: 9ca13435c3d5: Waiting Step #1: 8328a6d3718e: Pulling fs layer Step #1: f78fc20d3c3c: Pulling fs layer Step #1: 88e3f27d7c68: Waiting Step #1: 3c766dd49ffb: Waiting Step #1: cfbfe91f834e: Waiting Step #1: 03589768b946: Waiting Step #1: 476467ef4fc6: Waiting Step #1: 8328a6d3718e: Waiting Step #1: 479b0a7911fe: Waiting Step #1: d8ea79b21b9a: Waiting Step #1: 74524f23875e: Waiting Step #1: 8a3a946d5a7c: Waiting Step #1: b33bd0575475: Waiting Step #1: 0b187dafa8d3: Waiting Step #1: b8e63fb00ce7: Waiting Step #1: fe996ae7dc59: Verifying Checksum Step #1: fe996ae7dc59: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: f835b9e0cf1c: Verifying Checksum Step #1: f835b9e0cf1c: Download complete Step #1: 87e0e48e0cd6: Verifying Checksum Step #1: 87e0e48e0cd6: Download complete Step #1: af789c137254: Download complete Step #1: 3b1039f9896d: Verifying Checksum Step #1: 3b1039f9896d: Download complete Step #1: 27a60affb188: Verifying Checksum Step #1: 27a60affb188: Download complete Step #1: 03589768b946: Verifying Checksum Step #1: 03589768b946: Download complete Step #1: b549f31133a9: Pull complete Step #1: 3c766dd49ffb: Verifying Checksum Step #1: 3c766dd49ffb: Download complete Step #1: cfbfe91f834e: Verifying Checksum Step #1: cfbfe91f834e: Download complete Step #1: 0b187dafa8d3: Verifying Checksum Step #1: 0b187dafa8d3: Download complete Step #1: 345ac71c4767: Verifying Checksum Step #1: 345ac71c4767: Download complete Step #1: 7eadecc7791c: Verifying Checksum Step #1: 7eadecc7791c: Download complete Step #1: dde9b3807101: Verifying Checksum Step #1: dde9b3807101: Download complete Step #1: aa322f9d5179: Verifying Checksum Step #1: aa322f9d5179: Download complete Step #1: 476467ef4fc6: Verifying Checksum Step #1: 476467ef4fc6: Download complete Step #1: ed7ec7eeb8fb: Verifying Checksum Step #1: ed7ec7eeb8fb: Download complete Step #1: fcd3b4f5fe45: Verifying Checksum Step #1: fcd3b4f5fe45: Download complete Step #1: 88e3f27d7c68: Verifying Checksum Step #1: 88e3f27d7c68: Download complete Step #1: 84249ace8dd9: Verifying Checksum Step #1: b48628b9660b: Verifying Checksum Step #1: b48628b9660b: Download complete Step #1: 560589aab225: Verifying Checksum Step #1: 560589aab225: Download complete Step #1: 9ca13435c3d5: Verifying Checksum Step #1: 9ca13435c3d5: Download complete Step #1: aff0ac00717e: Verifying Checksum Step #1: aff0ac00717e: Download complete Step #1: bdf125cfc8ec: Verifying Checksum Step #1: bdf125cfc8ec: Download complete Step #1: 479b0a7911fe: Download complete Step #1: b33bd0575475: Verifying Checksum Step #1: b33bd0575475: Download complete Step #1: 58dcb60388c1: Verifying Checksum Step #1: 58dcb60388c1: Download complete Step #1: d8ea79b21b9a: Download complete Step #1: b8e63fb00ce7: Verifying Checksum Step #1: b8e63fb00ce7: Download complete Step #1: 8a3a946d5a7c: Verifying Checksum Step #1: 8a3a946d5a7c: Download complete Step #1: 8328a6d3718e: Verifying Checksum Step #1: 8328a6d3718e: Download complete Step #1: 27a60affb188: Pull complete Step #1: fe996ae7dc59: Pull complete Step #1: 87e0e48e0cd6: Pull complete Step #1: f78fc20d3c3c: Verifying Checksum Step #1: f78fc20d3c3c: Download complete Step #1: f835b9e0cf1c: Pull complete Step #1: af789c137254: Pull complete Step #1: aff0ac00717e: Pull complete Step #1: 3b1039f9896d: Pull complete Step #1: 03589768b946: Pull complete Step #1: 476467ef4fc6: Pull complete Step #1: 3c766dd49ffb: Pull complete Step #1: cfbfe91f834e: Pull complete Step #1: 0b187dafa8d3: Pull complete Step #1: 345ac71c4767: Pull complete Step #1: 7eadecc7791c: Pull complete Step #1: dde9b3807101: Pull complete Step #1: aa322f9d5179: Pull complete Step #1: ed7ec7eeb8fb: Pull complete Step #1: fcd3b4f5fe45: Pull complete Step #1: 88e3f27d7c68: Pull complete Step #1: 84249ace8dd9: Pull complete Step #1: b48628b9660b: Pull complete Step #1: 560589aab225: Pull complete Step #1: 8049d1ac7afb: Pull complete Step #1: 9ca13435c3d5: Pull complete Step #1: bdf125cfc8ec: Pull complete Step #1: 479b0a7911fe: Pull complete Step #1: b33bd0575475: Pull complete Step #1: 58dcb60388c1: Pull complete Step #1: b8e63fb00ce7: Pull complete Step #1: d8ea79b21b9a: Pull complete Step #1: 74524f23875e: Pull complete Step #1: 8a3a946d5a7c: Pull complete Step #1: 8328a6d3718e: Pull complete Step #1: f78fc20d3c3c: Pull complete Step #1: Digest: sha256:c0fb662d9fcc1356c13c0e3c527517aca137e98324f0576a8b427e6cfb4464a0 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-rust:latest Step #1: ---> 247c0a783738 Step #1: Step 2/4 : RUN git clone --depth 1 https://github.com/signalapp/mp4san mp4san Step #1: ---> Running in 1c9669b2c081 Step #1: Cloning into 'mp4san'... Step #1: Removing intermediate container 1c9669b2c081 Step #1: ---> 104b7da0ae28 Step #1: Step 3/4 : WORKDIR mp4san Step #1: ---> Running in 55af9a92665c Step #1: Removing intermediate container 55af9a92665c Step #1: ---> dc95d39ac9bf Step #1: Step 4/4 : COPY build.sh $SRC/ Step #1: ---> 83ad3169ce85 Step #1: Successfully built 83ad3169ce85 Step #1: Successfully tagged gcr.io/oss-fuzz/mp4san:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/mp4san Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file3ZNQ3M Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ rust == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/mp4san/.git Step #2 - "srcmap": + GIT_DIR=/src/mp4san Step #2 - "srcmap": + cd /src/mp4san Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/signalapp/mp4san Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=afa74cb65bb16d47b5041a18464f0f7069a8f43f Step #2 - "srcmap": + jq_inplace /tmp/file3ZNQ3M '."/src/mp4san" = { type: "git", url: "https://github.com/signalapp/mp4san", rev: "afa74cb65bb16d47b5041a18464f0f7069a8f43f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileQbwvlb Step #2 - "srcmap": + cat /tmp/file3ZNQ3M Step #2 - "srcmap": + jq '."/src/mp4san" = { type: "git", url: "https://github.com/signalapp/mp4san", rev: "afa74cb65bb16d47b5041a18464f0f7069a8f43f" }' Step #2 - "srcmap": + mv /tmp/fileQbwvlb /tmp/file3ZNQ3M Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file3ZNQ3M Step #2 - "srcmap": + rm /tmp/file3ZNQ3M Step #2 - "srcmap": { Step #2 - "srcmap": "/src/mp4san": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/signalapp/mp4san", Step #2 - "srcmap": "rev": "afa74cb65bb16d47b5041a18464f0f7069a8f43f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + PROJECT_DIR=/src/mp4san Step #3 - "compile-libfuzzer-address-x86_64": + for crate_dir in mp4san webpsan Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_DIR=/src/mp4san/mp4san/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/mp4san/mp4san/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O --debug-assertions Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 47 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding convert_case v0.4.0 (latest: v0.7.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding derive_more v0.99.19 (latest: v2.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding downcast-rs v1.2.1 (latest: v2.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding thiserror v1.0.69 (latest: v2.0.11) Step #3 - "compile-libfuzzer-address-x86_64":  Adding thiserror-impl v1.0.69 (latest: v2.0.11) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded darling v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded darling_core v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded ident_case v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded dyn-clonable-impl v0.9.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded derive_builder_macro v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded dyn-clonable v0.9.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded slab v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded thiserror v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded thiserror-impl v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded semver v1.0.25 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded uuid v1.14.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded cc v1.2.14 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bytes v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libfuzzer-sys v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded derive_more v0.99.19 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded derive-where v1.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded unicode-ident v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded paste v1.0.15 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded log v0.4.26 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded syn v2.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded derive_builder_core v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded derive_builder v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded strsim v0.11.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded rustc_version v0.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded fnv v1.0.7 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded dyn-clone v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded downcast-rs v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded convert_case v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded darling_macro v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling strsim v0.11.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ident_case v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling thiserror v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling convert_case v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling paste v1.0.15 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling uuid v1.14.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bytes v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling dyn-clone v1.0.18 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.26 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling downcast-rs v1.2.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling slab v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling_core v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling thiserror-impl v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling dyn-clonable-impl v0.9.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_more v0.99.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling mp4san-derive v0.5.3 (/src/mp4san/mp4san-derive) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive-where v1.2.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling dyn-clonable v0.9.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling_macro v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder_core v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder_macro v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling mediasan-common v0.5.3 (/src/mp4san/common) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling mp4san v0.5.3 (/src/mp4san/mp4san) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling mp4san-fuzz v0.0.0 (/src/mp4san/mp4san/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:8:20 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 |  #[cfg_attr(not(fuzzing_repro), allow(unused))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:11:19 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:22:27 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 22 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:28:23 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 28 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `mp4san-fuzz` (bin "sanitize") generated 4 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 18.23s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_INPUT_DIR=/src/mp4san/mp4san/fuzz/input Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=/src/mp4san/mp4san/fuzz/target/x86_64-unknown-linux-gnu/release/ Step #3 - "compile-libfuzzer-address-x86_64": + for fuzz_target in $FUZZ_DIR/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/mp4san/mp4san/fuzz/fuzz_targets/sanitize Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=sanitize Step #3 - "compile-libfuzzer-address-x86_64": + OUT_FUZZ_TARGET_NAME=mp4san-sanitize Step #3 - "compile-libfuzzer-address-x86_64": + cp /src/mp4san/mp4san/fuzz/target/x86_64-unknown-linux-gnu/release//sanitize /workspace/out/libfuzzer-address-x86_64/mp4san-sanitize Step #3 - "compile-libfuzzer-address-x86_64": + cat /src/mp4san/mp4san/fuzz/mp4.dict Step #3 - "compile-libfuzzer-address-x86_64": + zip -jr /workspace/out/libfuzzer-address-x86_64/mp4san-sanitize_seed_corpus.zip /src/mp4san/mp4san/fuzz/input/ Step #3 - "compile-libfuzzer-address-x86_64": adding: ffmpeg-black-1f.mp4 (deflated 41%) Step #3 - "compile-libfuzzer-address-x86_64": adding: ffmpeg-smptebars-30f.mp4 (deflated 36%) Step #3 - "compile-libfuzzer-address-x86_64": + for crate_dir in mp4san webpsan Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_DIR=/src/mp4san/webpsan/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/mp4san/webpsan/fuzz Step #3 - "compile-libfuzzer-address-x86_64": + cargo fuzz build -O --debug-assertions Step #3 - "compile-libfuzzer-address-x86_64":  Updating crates.io index Step #3 - "compile-libfuzzer-address-x86_64":  Locking 44 packages to latest compatible versions Step #3 - "compile-libfuzzer-address-x86_64":  Adding bitstream-io v1.10.0 (latest: v2.6.0) Step #3 - "compile-libfuzzer-address-x86_64":  Adding convert_case v0.4.0 (latest: v0.7.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding derive_more v0.99.19 (latest: v2.0.1) Step #3 - "compile-libfuzzer-address-x86_64":  Adding thiserror v1.0.69 (latest: v2.0.11) Step #3 - "compile-libfuzzer-address-x86_64":  Adding thiserror-impl v1.0.69 (latest: v2.0.11) Step #3 - "compile-libfuzzer-address-x86_64":  Downloading crates ... Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded num-integer v0.1.46 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded assert_matches v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitstream-io v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Downloaded num-traits v0.2.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling proc-macro2 v1.0.93 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling unicode-ident v1.0.17 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling autocfg v1.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libc v0.2.169 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling strsim v0.11.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling ident_case v1.0.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling fnv v1.0.7 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling thiserror v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling shlex v1.3.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-core v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling convert_case v0.4.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling memchr v2.7.4 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-project-lite v0.2.16 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling pin-utils v0.1.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-io v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-task v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bytes v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitflags v2.8.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling arbitrary v1.4.1 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling assert_matches v1.5.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling log v0.4.26 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling bitstream-io v1.10.0 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling slab v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-traits v0.2.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling quote v1.0.38 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling futures-util v0.3.31 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling syn v2.0.98 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling jobserver v0.1.32 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling cc v1.2.14 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling num-integer v0.1.46 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling libfuzzer-sys v0.4.9 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling_core v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling thiserror-impl v1.0.69 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_more v0.99.19 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling_macro v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling darling v0.20.10 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder_core v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder_macro v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling mediasan-common v0.5.3 (/src/mp4san/common) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling derive_builder v0.20.2 Step #3 - "compile-libfuzzer-address-x86_64":  Compiling webpsan v0.5.3 (/src/mp4san/webpsan) Step #3 - "compile-libfuzzer-address-x86_64":  Compiling webpsan-fuzz v0.0.0 (/src/mp4san/webpsan/fuzz) Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:8:20 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 8 |  #[cfg_attr(not(fuzzing_repro), allow(unused))] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: expected names are: `clippy`, `debug_assertions`, `doc`, `docsrs`, `doctest`, `feature`, `miri`, `overflow_checks`, `panic`, `proc_macro`, `relocation_model`, `rustfmt`, `sanitize`, `sanitizer_cfi_generalize_pointers`, `sanitizer_cfi_normalize_integers`, `target_abi`, `target_arch`, `target_endian`, `target_env`, `target_family`, `target_feature`, `target_has_atomic`, `target_has_atomic_equal_alignment`, `target_has_atomic_load_store`, `target_os`, `target_pointer_width`, `target_thread_local`, `target_vendor`, `test`, `ub_checks`, `unix`, and `windows` Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64":  = note: `#[warn(unexpected_cfgs)]` on by default Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:11:19 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 11 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:17:27 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 17 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: unexpected `cfg` condition name: `fuzzing_repro` Step #3 - "compile-libfuzzer-address-x86_64":  --> fuzz_targets/sanitize.rs:23:23 Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64": 23 |  #[cfg(fuzzing_repro)] Step #3 - "compile-libfuzzer-address-x86_64":  | ^^^^^^^^^^^^^ Step #3 - "compile-libfuzzer-address-x86_64":  | Step #3 - "compile-libfuzzer-address-x86_64":  = help: consider using a Cargo feature instead Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding in `Cargo.toml` the `check-cfg` lint config for the lint: Step #3 - "compile-libfuzzer-address-x86_64":  [lints.rust] Step #3 - "compile-libfuzzer-address-x86_64":  unexpected_cfgs = { level = "warn", check-cfg = ['cfg(fuzzing_repro)'] } Step #3 - "compile-libfuzzer-address-x86_64":  = help: or consider adding `println!("cargo::rustc-check-cfg=cfg(fuzzing_repro)");` to the top of the `build.rs` Step #3 - "compile-libfuzzer-address-x86_64":  = note: see for more information about checking conditional configuration Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": warning: `webpsan-fuzz` (bin "sanitize") generated 4 warnings Step #3 - "compile-libfuzzer-address-x86_64":  Finished `release` profile [optimized + debuginfo] target(s) in 31.77s Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_INPUT_DIR=/src/mp4san/webpsan/fuzz/input Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_OUTPUT_DIR=/src/mp4san/webpsan/fuzz/target/x86_64-unknown-linux-gnu/release/ Step #3 - "compile-libfuzzer-address-x86_64": + for fuzz_target in $FUZZ_DIR/fuzz_targets/*.rs Step #3 - "compile-libfuzzer-address-x86_64": ++ basename /src/mp4san/webpsan/fuzz/fuzz_targets/sanitize Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_TARGET_NAME=sanitize Step #3 - "compile-libfuzzer-address-x86_64": + OUT_FUZZ_TARGET_NAME=webpsan-sanitize Step #3 - "compile-libfuzzer-address-x86_64": + cp /src/mp4san/webpsan/fuzz/target/x86_64-unknown-linux-gnu/release//sanitize /workspace/out/libfuzzer-address-x86_64/webpsan-sanitize Step #3 - "compile-libfuzzer-address-x86_64": + cat /src/mp4san/webpsan/fuzz/webp.dict Step #3 - "compile-libfuzzer-address-x86_64": + zip -jr /workspace/out/libfuzzer-address-x86_64/webpsan-sanitize_seed_corpus.zip /src/mp4san/webpsan/fuzz/input/ Step #3 - "compile-libfuzzer-address-x86_64": adding: smallest-possible.webp (deflated 4%) Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 27a60affb188: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": fe996ae7dc59: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 1fb60f76380f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ceacc69a5eb6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 56df53c7e92f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5b0678c590a1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 643b93c5a493: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3a053ccbe2fc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 75399c9193ed: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 73b63ae67252: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 958e446b901c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 596eac7a3fb3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3f5cabb069a2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 82db9b94cb83: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c75b5213d1e6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 09665408fcc1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 512c6bb36969: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b8df1e8c820b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 552a7107d98a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": eb6497a150eb: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4e0ebe252713: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5b0678c590a1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a210141399dc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 49e603669c49: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 643b93c5a493: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 75399c9193ed: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3a053ccbe2fc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fd39327fd459: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 471f435a1c08: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 73b63ae67252: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 958e446b901c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 596eac7a3fb3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4e0ebe252713: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3f5cabb069a2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 512c6bb36969: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a210141399dc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b8df1e8c820b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 82db9b94cb83: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 49e603669c49: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 552a7107d98a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c75b5213d1e6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fd39327fd459: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": eb6497a150eb: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 09665408fcc1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 56df53c7e92f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1fb60f76380f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ceacc69a5eb6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ceacc69a5eb6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 643b93c5a493: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 643b93c5a493: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5b0678c590a1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5b0678c590a1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1fb60f76380f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 73b63ae67252: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 73b63ae67252: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 75399c9193ed: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 958e446b901c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ceacc69a5eb6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f5cabb069a2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3f5cabb069a2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 56df53c7e92f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3a053ccbe2fc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3a053ccbe2fc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 82db9b94cb83: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 82db9b94cb83: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c75b5213d1e6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c75b5213d1e6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5b0678c590a1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 512c6bb36969: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 512c6bb36969: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 643b93c5a493: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 596eac7a3fb3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 596eac7a3fb3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 09665408fcc1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 09665408fcc1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 552a7107d98a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 552a7107d98a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": eb6497a150eb: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e0ebe252713: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4e0ebe252713: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a210141399dc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a210141399dc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 49e603669c49: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 49e603669c49: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fd39327fd459: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fd39327fd459: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 471f435a1c08: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 471f435a1c08: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b8df1e8c820b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": b8df1e8c820b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3a053ccbe2fc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 75399c9193ed: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 73b63ae67252: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 958e446b901c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 596eac7a3fb3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f5cabb069a2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 82db9b94cb83: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c75b5213d1e6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 09665408fcc1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 512c6bb36969: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b8df1e8c820b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 552a7107d98a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": eb6497a150eb: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e0ebe252713: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a210141399dc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 49e603669c49: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fd39327fd459: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 471f435a1c08: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:6380368e5a1bcc9a8c85c797794b7522f246f2693da3edf42319530441784b00 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpmtk27286/webpsan-sanitize Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpmtk27286/mp4san-sanitize Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/mp4san Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: mp4san-sanitize (deflated 71%) Step #6: adding: mp4san-sanitize.dict (deflated 60%) Step #6: adding: mp4san-sanitize_seed_corpus.zip (stored 0%) Step #6: adding: webpsan-sanitize (deflated 72%) Step #6: adding: webpsan-sanitize.dict (deflated 30%) Step #6: adding: webpsan-sanitize_seed_corpus.zip (stored 0%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 7eb39101e508: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 150 0 0 100 150 0 724 --:--:-- --:--:-- --:--:-- 728 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 11.8M 0 0 100 11.8M 0 40.0M --:--:-- --:--:-- --:--:-- 40.1M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 33 0 0 100 33 0 106 --:--:-- --:--:-- --:--:-- 106 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 148 --:--:-- --:--:-- --:--:-- 149 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/mp4san Finished Step #11 PUSH DONE