starting build "83278955-58e0-481d-9045-7c7b62fc6c8d" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 7.168kB Step #1: Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: b934be1d2d13: Pulling fs layer Step #1: 4fe5b2e0ef90: Pulling fs layer Step #1: e220cc641a8a: Pulling fs layer Step #1: 1fc6ff326d93: Pulling fs layer Step #1: fe7c10e6bee9: Pulling fs layer Step #1: 119259617745: Pulling fs layer Step #1: dc5c7fb31b24: Pulling fs layer Step #1: c7394b47bcb5: Pulling fs layer Step #1: 72502601e316: Pulling fs layer Step #1: 964695041051: Pulling fs layer Step #1: 9f458904846d: Pulling fs layer Step #1: 4befeaeb9cfe: Pulling fs layer Step #1: cba88878806d: Pulling fs layer Step #1: b67fbc4808b4: Pulling fs layer Step #1: 12f4a0b88b24: Pulling fs layer Step #1: ae587f7cd834: Pulling fs layer Step #1: 3c0a22bae098: Pulling fs layer Step #1: 978c61468322: Pulling fs layer Step #1: e220cc641a8a: Waiting Step #1: 3864d0d12994: Pulling fs layer Step #1: 1fc6ff326d93: Waiting Step #1: 62d1b5c9c037: Pulling fs layer Step #1: 488647443a84: Pulling fs layer Step #1: 36923e83be1f: Pulling fs layer Step #1: fe7c10e6bee9: Waiting Step #1: 119259617745: Waiting Step #1: dc5c7fb31b24: Waiting Step #1: 0fcd23c04ca5: Pulling fs layer Step #1: 7a5709c6d027: Pulling fs layer Step #1: c7394b47bcb5: Waiting Step #1: ccc4ee367f74: Pulling fs layer Step #1: 957c449a85aa: Pulling fs layer Step #1: 72502601e316: Waiting Step #1: 47992d24ae67: Pulling fs layer Step #1: 3790a6ce4db3: Pulling fs layer Step #1: 964695041051: Waiting Step #1: cf7c48029f2a: Pulling fs layer Step #1: cb8617fa9202: Pulling fs layer Step #1: 9f458904846d: Waiting Step #1: 28ff76e6eaed: Pulling fs layer Step #1: 01aac2d3a986: Pulling fs layer Step #1: 4befeaeb9cfe: Waiting Step #1: b67fbc4808b4: Waiting Step #1: cba88878806d: Waiting Step #1: 12f4a0b88b24: Waiting Step #1: 62d1b5c9c037: Waiting Step #1: ae587f7cd834: Waiting Step #1: 3c0a22bae098: Waiting Step #1: 488647443a84: Waiting Step #1: 36923e83be1f: Waiting Step #1: 3790a6ce4db3: Waiting Step #1: 978c61468322: Waiting Step #1: 0fcd23c04ca5: Waiting Step #1: cf7c48029f2a: Waiting Step #1: 7a5709c6d027: Waiting Step #1: cb8617fa9202: Waiting Step #1: ccc4ee367f74: Waiting Step #1: 3864d0d12994: Waiting Step #1: 28ff76e6eaed: Waiting Step #1: 47992d24ae67: Waiting Step #1: 957c449a85aa: Waiting Step #1: 4fe5b2e0ef90: Verifying Checksum Step #1: 4fe5b2e0ef90: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 1fc6ff326d93: Verifying Checksum Step #1: 1fc6ff326d93: Download complete Step #1: e220cc641a8a: Verifying Checksum Step #1: e220cc641a8a: Download complete Step #1: fe7c10e6bee9: Verifying Checksum Step #1: fe7c10e6bee9: Download complete Step #1: dc5c7fb31b24: Download complete Step #1: c7394b47bcb5: Verifying Checksum Step #1: c7394b47bcb5: Download complete Step #1: b934be1d2d13: Verifying Checksum Step #1: b934be1d2d13: Download complete Step #1: 964695041051: Verifying Checksum Step #1: 964695041051: Download complete Step #1: b549f31133a9: Pull complete Step #1: 9f458904846d: Download complete Step #1: 4befeaeb9cfe: Verifying Checksum Step #1: 4befeaeb9cfe: Download complete Step #1: cba88878806d: Verifying Checksum Step #1: cba88878806d: Download complete Step #1: b67fbc4808b4: Verifying Checksum Step #1: b67fbc4808b4: Download complete Step #1: 12f4a0b88b24: Verifying Checksum Step #1: 12f4a0b88b24: Download complete Step #1: ae587f7cd834: Download complete Step #1: 3c0a22bae098: Verifying Checksum Step #1: 3c0a22bae098: Download complete Step #1: 978c61468322: Verifying Checksum Step #1: 978c61468322: Download complete Step #1: 72502601e316: Verifying Checksum Step #1: 72502601e316: Download complete Step #1: 3864d0d12994: Verifying Checksum Step #1: 3864d0d12994: Download complete Step #1: 62d1b5c9c037: Download complete Step #1: 36923e83be1f: Download complete Step #1: 488647443a84: Verifying Checksum Step #1: 488647443a84: Download complete Step #1: 0fcd23c04ca5: Verifying Checksum Step #1: 0fcd23c04ca5: Download complete Step #1: 7a5709c6d027: Verifying Checksum Step #1: 7a5709c6d027: Download complete Step #1: ccc4ee367f74: Verifying Checksum Step #1: ccc4ee367f74: Download complete Step #1: 957c449a85aa: Download complete Step #1: 47992d24ae67: Download complete Step #1: cf7c48029f2a: Verifying Checksum Step #1: cf7c48029f2a: Download complete Step #1: 3790a6ce4db3: Download complete Step #1: cb8617fa9202: Verifying Checksum Step #1: cb8617fa9202: Download complete Step #1: 28ff76e6eaed: Verifying Checksum Step #1: 28ff76e6eaed: Download complete Step #1: 119259617745: Verifying Checksum Step #1: 119259617745: Download complete Step #1: 01aac2d3a986: Verifying Checksum Step #1: 01aac2d3a986: Download complete Step #1: b934be1d2d13: Pull complete Step #1: 4fe5b2e0ef90: Pull complete Step #1: e220cc641a8a: Pull complete Step #1: 1fc6ff326d93: Pull complete Step #1: fe7c10e6bee9: Pull complete Step #1: 119259617745: Pull complete Step #1: dc5c7fb31b24: Pull complete Step #1: c7394b47bcb5: Pull complete Step #1: 72502601e316: Pull complete Step #1: 964695041051: Pull complete Step #1: 9f458904846d: Pull complete Step #1: 4befeaeb9cfe: Pull complete Step #1: cba88878806d: Pull complete Step #1: b67fbc4808b4: Pull complete Step #1: 12f4a0b88b24: Pull complete Step #1: ae587f7cd834: Pull complete Step #1: 3c0a22bae098: Pull complete Step #1: 978c61468322: Pull complete Step #1: 3864d0d12994: Pull complete Step #1: 62d1b5c9c037: Pull complete Step #1: 488647443a84: Pull complete Step #1: 36923e83be1f: Pull complete Step #1: 0fcd23c04ca5: Pull complete Step #1: 7a5709c6d027: Pull complete Step #1: ccc4ee367f74: Pull complete Step #1: 957c449a85aa: Pull complete Step #1: 47992d24ae67: Pull complete Step #1: 3790a6ce4db3: Pull complete Step #1: cf7c48029f2a: Pull complete Step #1: cb8617fa9202: Pull complete Step #1: 28ff76e6eaed: Pull complete Step #1: 01aac2d3a986: Pull complete Step #1: Digest: sha256:8366c430b793536389271976ad22674abbf936a30f18f1d7a06a4503aeee4f21 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> 92a582034827 Step #1: Step 2/5 : RUN git clone https://github.com/pallets/markupsafe markupsafe Step #1: ---> Running in 52ec72a321e1 Step #1: Cloning into 'markupsafe'... Step #1: Removing intermediate container 52ec72a321e1 Step #1: ---> 494405fdc022 Step #1: Step 3/5 : RUN python3 -m pip install --upgrade pip Step #1: ---> Running in 112f0d56a2a1 Step #1: Collecting pip Step #1: Downloading https://files.pythonhosted.org/packages/8a/6a/19e9fe04fca059ccf770861c7d5721ab4c2aebc539889e97c7977528a53b/pip-24.0-py3-none-any.whl (2.1MB) Step #1: Installing collected packages: pip Step #1: Found existing installation: pip 19.2.3 Step #1: Uninstalling pip-19.2.3: Step #1: Successfully uninstalled pip-19.2.3 Step #1: Successfully installed pip-24.0 Step #1: Removing intermediate container 112f0d56a2a1 Step #1: ---> a0fe28894a3a Step #1: Step 4/5 : COPY *.sh *py $SRC/ Step #1: ---> 62b88e7386f3 Step #1: Step 5/5 : WORKDIR $SRC/markupsafe Step #1: ---> Running in b1d6d505f5e2 Step #1: Removing intermediate container b1d6d505f5e2 Step #1: ---> 29af544972cb Step #1: Successfully built 29af544972cb Step #1: Successfully tagged gcr.io/oss-fuzz/markupsafe:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/markupsafe Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileAyrq1N Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/markupsafe/.git Step #2 - "srcmap": + GIT_DIR=/src/markupsafe Step #2 - "srcmap": + cd /src/markupsafe Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/pallets/markupsafe Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=d12057361ad75c4569e2e61712c234acc69d5d0b Step #2 - "srcmap": + jq_inplace /tmp/fileAyrq1N '."/src/markupsafe" = { type: "git", url: "https://github.com/pallets/markupsafe", rev: "d12057361ad75c4569e2e61712c234acc69d5d0b" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileydLZCb Step #2 - "srcmap": + cat /tmp/fileAyrq1N Step #2 - "srcmap": + jq '."/src/markupsafe" = { type: "git", url: "https://github.com/pallets/markupsafe", rev: "d12057361ad75c4569e2e61712c234acc69d5d0b" }' Step #2 - "srcmap": + mv /tmp/fileydLZCb /tmp/fileAyrq1N Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileAyrq1N Step #2 - "srcmap": + rm /tmp/fileAyrq1N Step #2 - "srcmap": { Step #2 - "srcmap": "/src/markupsafe": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/pallets/markupsafe", Step #2 - "srcmap": "rev": "d12057361ad75c4569e2e61712c234acc69d5d0b" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + pip3 install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/markupsafe Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Installing backend dependencies ... [?25l- \ | done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25l- done Step #3 - "compile-libfuzzer-address-x86_64": [?25hBuilding wheels for collected packages: MarkupSafe Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for MarkupSafe (pyproject.toml) ... [?25l- \ done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for MarkupSafe: filename=MarkupSafe-3.0.0.dev0-cp38-cp38-linux_x86_64.whl size=19179 sha256=3acdc8a11b54c8388689436a12af29a36c0ad5581d931053d0dfcf6c363a4996 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-reyv5g4x/wheels/09/d6/ea/91211041e051fe10eb1b2aaf5495c3aa1960b1570cb05014a5 Step #3 - "compile-libfuzzer-address-x86_64": Successfully built MarkupSafe Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: MarkupSafe Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed MarkupSafe-3.0.0.dev0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_encoding.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_encoding.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_encoding.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_encoding Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_encoding.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_encoding Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_encoding Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_encoding --onefile --name fuzz_encoding.pkg /src/fuzz_encoding.py Step #3 - "compile-libfuzzer-address-x86_64": 48 INFO: PyInstaller: 5.0.1 Step #3 - "compile-libfuzzer-address-x86_64": 48 INFO: Python: 3.8.3 Step #3 - "compile-libfuzzer-address-x86_64": 49 INFO: Platform: Linux-5.10.0-29-cloud-amd64-x86_64-with-glibc2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": 49 INFO: wrote /src/markupsafe/fuzz_encoding.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 52 INFO: UPX is not available. Step #3 - "compile-libfuzzer-address-x86_64": 53 INFO: Extending PYTHONPATH with paths Step #3 - "compile-libfuzzer-address-x86_64": ['/src'] Step #3 - "compile-libfuzzer-address-x86_64": 239 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 240 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 240 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 241 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 249 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 2615 INFO: Processing pre-find module path hook distutils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-distutils.py'. Step #3 - "compile-libfuzzer-address-x86_64": 2615 INFO: distutils: retargeting to non-venv dir '/usr/local/lib/python3.8' Step #3 - "compile-libfuzzer-address-x86_64": 3980 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4099 INFO: running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 4125 INFO: Analyzing /src/fuzz_encoding.py Step #3 - "compile-libfuzzer-address-x86_64": 4208 INFO: Processing module hooks... Step #3 - "compile-libfuzzer-address-x86_64": 4209 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'... Step #3 - "compile-libfuzzer-address-x86_64": 4210 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4211 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4212 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4213 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4254 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4255 INFO: Loading module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4262 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4466 INFO: Loading module hook 'hook-distutils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 4475 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 4480 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 4483 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_subprocess.py' Step #3 - "compile-libfuzzer-address-x86_64": 4485 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py' Step #3 - "compile-libfuzzer-address-x86_64": 4487 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py' Step #3 - "compile-libfuzzer-address-x86_64": 4489 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py' Step #3 - "compile-libfuzzer-address-x86_64": 4494 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 5408 INFO: Looking for eggs Step #3 - "compile-libfuzzer-address-x86_64": 5408 INFO: Using Python library /usr/local/lib/libpython3.8.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 5412 INFO: Warnings written to /src/pyfuzzworkdir//fuzz_encoding/fuzz_encoding.pkg/warn-fuzz_encoding.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 5437 INFO: Graph cross-reference written to /src/pyfuzzworkdir//fuzz_encoding/fuzz_encoding.pkg/xref-fuzz_encoding.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 5449 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 5449 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 5449 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_encoding/fuzz_encoding.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 5765 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//fuzz_encoding/fuzz_encoding.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 5771 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 5771 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 5771 INFO: Building PKG (CArchive) fuzz_encoding.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 11405 INFO: Building PKG (CArchive) fuzz_encoding.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 11407 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 11407 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 11407 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 11407 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 11408 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_encoding.pkg Step #3 - "compile-libfuzzer-address-x86_64": 11408 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 11474 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_encoding.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_encoding.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_encoding.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_encoding Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": b934be1d2d13: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 4fe5b2e0ef90: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": c25af4d3c45b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2b16b0c7d9df: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 894cdabcfe79: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 939857efe320: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a5b56b6fc512: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": af96c18cbf20: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 22d3bbefcf7b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3f12040598c0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 63ee476d3c3e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3b195b83a51c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4d171a0cbd06: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ebc89753d7c7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fb4267e48da1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 9ad0135d2a07: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a5b56b6fc512: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4d171a0cbd06: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ebc89753d7c7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fb4267e48da1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": af96c18cbf20: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9ad0135d2a07: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 63ee476d3c3e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3f12040598c0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3b195b83a51c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 939857efe320: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 894cdabcfe79: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 894cdabcfe79: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c25af4d3c45b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c25af4d3c45b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2b16b0c7d9df: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2b16b0c7d9df: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": af96c18cbf20: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": af96c18cbf20: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a5b56b6fc512: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a5b56b6fc512: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c25af4d3c45b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 22d3bbefcf7b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 63ee476d3c3e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 63ee476d3c3e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2b16b0c7d9df: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f12040598c0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3f12040598c0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 894cdabcfe79: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4d171a0cbd06: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4d171a0cbd06: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": ebc89753d7c7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ebc89753d7c7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 939857efe320: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 939857efe320: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9ad0135d2a07: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3b195b83a51c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3b195b83a51c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fb4267e48da1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fb4267e48da1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 939857efe320: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a5b56b6fc512: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": af96c18cbf20: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 22d3bbefcf7b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3f12040598c0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 63ee476d3c3e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3b195b83a51c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4d171a0cbd06: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ebc89753d7c7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": fb4267e48da1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9ad0135d2a07: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:3e9733f9d9112f6e1659ddb31e70057aea51b0709c4ac6aafd7e63813d32007e Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp4z0in12v/fuzz_encoding Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/markupsafe Step #6: adding: fuzz_encoding (deflated 32%) Step #6: adding: fuzz_encoding.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 67%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Waiting Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 156 0 0 100 156 0 905 --:--:-- --:--:-- --:--:-- 906 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 20.6M 0 0 100 20.6M 0 54.7M --:--:-- --:--:-- --:--:-- 54.7M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 14 0 0 100 14 0 47 --:--:-- --:--:-- --:--:-- 47 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 35 0 0 100 35 0 144 --:--:-- --:--:-- --:--:-- 146 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/markupsafe Finished Step #11 PUSH DONE