starting build "abf6907c-7bbb-48e5-b055-2addef901dc7" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 10.75kB Step #1: Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: d7bfe07ed847: Pulling fs layer Step #1: 95088a006ac2: Pulling fs layer Step #1: 923ecc5ed2f2: Pulling fs layer Step #1: f01948677514: Pulling fs layer Step #1: d021283f1705: Pulling fs layer Step #1: 2b17087b4d48: Pulling fs layer Step #1: 6039ab354f49: Pulling fs layer Step #1: 94a141950302: Pulling fs layer Step #1: 32156974bc72: Pulling fs layer Step #1: c8649c6606f2: Pulling fs layer Step #1: a0dac62555f0: Pulling fs layer Step #1: a17e80b8ef02: Pulling fs layer Step #1: 140b7ee1731a: Pulling fs layer Step #1: 1b2a439733e9: Pulling fs layer Step #1: 0135fca36f8e: Pulling fs layer Step #1: c973ddceaf0f: Pulling fs layer Step #1: 3768162e02ed: Pulling fs layer Step #1: b46fb867992f: Pulling fs layer Step #1: 3d6f8a878a20: Pulling fs layer Step #1: c999c6077bfc: Pulling fs layer Step #1: 36d498a2265c: Pulling fs layer Step #1: b10d835d8bde: Pulling fs layer Step #1: 05a0ada9e3fe: Pulling fs layer Step #1: 3fc8271649b8: Pulling fs layer Step #1: 32156974bc72: Waiting Step #1: c8649c6606f2: Waiting Step #1: a0dac62555f0: Waiting Step #1: a17e80b8ef02: Waiting Step #1: 140b7ee1731a: Waiting Step #1: 1b2a439733e9: Waiting Step #1: 0135fca36f8e: Waiting Step #1: f01948677514: Waiting Step #1: d021283f1705: Waiting Step #1: c973ddceaf0f: Waiting Step #1: 3768162e02ed: Waiting Step #1: b46fb867992f: Waiting Step #1: 3d6f8a878a20: Waiting Step #1: 2b17087b4d48: Waiting Step #1: 6039ab354f49: Waiting Step #1: c999c6077bfc: Waiting Step #1: 36d498a2265c: Waiting Step #1: b10d835d8bde: Waiting Step #1: 05a0ada9e3fe: Waiting Step #1: 3fc8271649b8: Waiting Step #1: 923ecc5ed2f2: Verifying Checksum Step #1: 923ecc5ed2f2: Download complete Step #1: f01948677514: Verifying Checksum Step #1: f01948677514: Download complete Step #1: 95088a006ac2: Verifying Checksum Step #1: 95088a006ac2: Download complete Step #1: 2b17087b4d48: Verifying Checksum Step #1: 2b17087b4d48: Download complete Step #1: d7bfe07ed847: Verifying Checksum Step #1: d7bfe07ed847: Download complete Step #1: d021283f1705: Verifying Checksum Step #1: d021283f1705: Download complete Step #1: 94a141950302: Verifying Checksum Step #1: 94a141950302: Download complete Step #1: c8649c6606f2: Verifying Checksum Step #1: c8649c6606f2: Download complete Step #1: a0dac62555f0: Verifying Checksum Step #1: a0dac62555f0: Download complete Step #1: a17e80b8ef02: Verifying Checksum Step #1: a17e80b8ef02: Download complete Step #1: 140b7ee1731a: Verifying Checksum Step #1: 140b7ee1731a: Download complete Step #1: 1b2a439733e9: Download complete Step #1: 0135fca36f8e: Download complete Step #1: c973ddceaf0f: Download complete Step #1: d7bfe07ed847: Pull complete Step #1: 3768162e02ed: Verifying Checksum Step #1: 3768162e02ed: Download complete Step #1: b46fb867992f: Verifying Checksum Step #1: b46fb867992f: Download complete Step #1: 3d6f8a878a20: Verifying Checksum Step #1: 3d6f8a878a20: Download complete Step #1: c999c6077bfc: Verifying Checksum Step #1: c999c6077bfc: Download complete Step #1: 36d498a2265c: Verifying Checksum Step #1: 36d498a2265c: Download complete Step #1: b10d835d8bde: Verifying Checksum Step #1: b10d835d8bde: Download complete Step #1: 32156974bc72: Verifying Checksum Step #1: 32156974bc72: Download complete Step #1: 3fc8271649b8: Verifying Checksum Step #1: 3fc8271649b8: Download complete Step #1: 6039ab354f49: Verifying Checksum Step #1: 6039ab354f49: Download complete Step #1: 95088a006ac2: Pull complete Step #1: 923ecc5ed2f2: Pull complete Step #1: 05a0ada9e3fe: Verifying Checksum Step #1: 05a0ada9e3fe: Download complete Step #1: f01948677514: Pull complete Step #1: d021283f1705: Pull complete Step #1: 2b17087b4d48: Pull complete Step #1: 6039ab354f49: Pull complete Step #1: 94a141950302: Pull complete Step #1: 32156974bc72: Pull complete Step #1: c8649c6606f2: Pull complete Step #1: a0dac62555f0: Pull complete Step #1: a17e80b8ef02: Pull complete Step #1: 140b7ee1731a: Pull complete Step #1: 1b2a439733e9: Pull complete Step #1: 0135fca36f8e: Pull complete Step #1: c973ddceaf0f: Pull complete Step #1: 3768162e02ed: Pull complete Step #1: b46fb867992f: Pull complete Step #1: 3d6f8a878a20: Pull complete Step #1: c999c6077bfc: Pull complete Step #1: 36d498a2265c: Pull complete Step #1: b10d835d8bde: Pull complete Step #1: 05a0ada9e3fe: Pull complete Step #1: 3fc8271649b8: Pull complete Step #1: Digest: sha256:662638d52815c91edb98a2ae326bc4be5b846d67107bdcd7342bada750e87729 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> fe066d634515 Step #1: Step 2/8 : RUN git clone --depth 1 https://github.com/catenacyber/gobughunt Step #1: ---> Running in 2036a686b806 Step #1: Cloning into 'gobughunt'... Step #1: Removing intermediate container 2036a686b806 Step #1: ---> 30dadb49c862 Step #1: Step 3/8 : RUN git clone https://go.googlesource.com/go goroot Step #1: ---> Running in 087ae29a82d8 Step #1: Cloning into 'goroot'... Step #1: Updating files: 72% (8493/11729) Updating files: 73% (8563/11729) Updating files: 74% (8680/11729) Updating files: 75% (8797/11729) Updating files: 76% (8915/11729) Updating files: 77% (9032/11729) Updating files: 78% (9149/11729) Updating files: 79% (9266/11729) Updating files: 80% (9384/11729) Updating files: 81% (9501/11729) Updating files: 82% (9618/11729) Updating files: 83% (9736/11729) Updating files: 84% (9853/11729) Updating files: 85% (9970/11729) Updating files: 86% (10087/11729) Updating files: 87% (10205/11729) Updating files: 88% (10322/11729) Updating files: 89% (10439/11729) Updating files: 90% (10557/11729) Updating files: 91% (10674/11729) Updating files: 92% (10791/11729) Updating files: 93% (10908/11729) Updating files: 94% (11026/11729) Updating files: 95% (11143/11729) Updating files: 96% (11260/11729) Updating files: 97% (11378/11729) Updating files: 98% (11495/11729) Updating files: 99% (11612/11729) Updating files: 100% (11729/11729) Updating files: 100% (11729/11729), done. Step #1: Removing intermediate container 087ae29a82d8 Step #1: ---> a00a44564efc Step #1: Step 4/8 : RUN git clone --depth 1 https://github.com/google/gonids Step #1: ---> Running in 17c702e71344 Step #1: Cloning into 'gonids'... Step #1: Removing intermediate container 17c702e71344 Step #1: ---> f0b179f6b6f5 Step #1: Step 5/8 : ADD https://rules.emergingthreats.net/open/suricata/emerging.rules.zip emerging.rules.zip Step #1: Step #1: Step #1: ---> 419e3855d9de Step #1: Step 6/8 : COPY build.sh $SRC/ Step #1: ---> 338b6c83fc68 Step #1: Step 7/8 : COPY *.diff $SRC/ Step #1: ---> 5a2b489c3627 Step #1: Step 8/8 : WORKDIR $SRC/gonids Step #1: ---> Running in 140be73bf358 Step #1: Removing intermediate container 140be73bf358 Step #1: ---> daf479f3fc7e Step #1: Successfully built daf479f3fc7e Step #1: Successfully tagged gcr.io/oss-fuzz/gonids:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gonids Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileKW0l5O Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gonids/.git Step #2 - "srcmap": + GIT_DIR=/src/gonids Step #2 - "srcmap": + cd /src/gonids Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gonids Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=4d00a2956aaa66dafe6062a33b7c1af420fe78e7 Step #2 - "srcmap": + jq_inplace /tmp/fileKW0l5O '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileVgHPbc Step #2 - "srcmap": + cat /tmp/fileKW0l5O Step #2 - "srcmap": + jq '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" }' Step #2 - "srcmap": + mv /tmp/fileVgHPbc /tmp/fileKW0l5O Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/goroot/.git Step #2 - "srcmap": + GIT_DIR=/src/goroot Step #2 - "srcmap": + cd /src/goroot Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://go.googlesource.com/go Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=3cf79d96105d890d7097d274804644b2a2093df1 Step #2 - "srcmap": + jq_inplace /tmp/fileKW0l5O '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "3cf79d96105d890d7097d274804644b2a2093df1" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filey9CQEG Step #2 - "srcmap": + cat /tmp/fileKW0l5O Step #2 - "srcmap": + jq '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "3cf79d96105d890d7097d274804644b2a2093df1" }' Step #2 - "srcmap": + mv /tmp/filey9CQEG /tmp/fileKW0l5O Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gobughunt/.git Step #2 - "srcmap": + GIT_DIR=/src/gobughunt Step #2 - "srcmap": + cd /src/gobughunt Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/catenacyber/gobughunt Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=dd2cc16ab555f5c03d83de4d6fac6525808909c2 Step #2 - "srcmap": + jq_inplace /tmp/fileKW0l5O '."/src/gobughunt" = { type: "git", url: "https://github.com/catenacyber/gobughunt", rev: "dd2cc16ab555f5c03d83de4d6fac6525808909c2" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filewOESBf Step #2 - "srcmap": + cat /tmp/fileKW0l5O Step #2 - "srcmap": + jq '."/src/gobughunt" = { type: "git", url: "https://github.com/catenacyber/gobughunt", rev: "dd2cc16ab555f5c03d83de4d6fac6525808909c2" }' Step #2 - "srcmap": + mv /tmp/filewOESBf /tmp/fileKW0l5O Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/aflplusplus/.git Step #2 - "srcmap": + GIT_DIR=/src/aflplusplus Step #2 - "srcmap": + cd /src/aflplusplus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c208dcf9c573e3d85990c7dea777646f7fa4961c Step #2 - "srcmap": + jq_inplace /tmp/fileKW0l5O '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileZVBOiL Step #2 - "srcmap": + cat /tmp/fileKW0l5O Step #2 - "srcmap": + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": + mv /tmp/fileZVBOiL /tmp/fileKW0l5O Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileKW0l5O Step #2 - "srcmap": + rm /tmp/fileKW0l5O Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gonids": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gonids", Step #2 - "srcmap": "rev": "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/goroot": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://go.googlesource.com/go", Step #2 - "srcmap": "rev": "3cf79d96105d890d7097d274804644b2a2093df1" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/gobughunt": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/catenacyber/gobughunt", Step #2 - "srcmap": "rev": "dd2cc16ab555f5c03d83de4d6fac6525808909c2" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/aflplusplus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2 - "srcmap": "rev": "c208dcf9c573e3d85990c7dea777646f7fa4961c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image: gcr.io/oss-fuzz/gonids Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/goroot/src Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/gobughunt/good Step #3 - "compile-libfuzzer-address-x86_64": + export bisect_good=e8666abd98 Step #3 - "compile-libfuzzer-address-x86_64": + bisect_good=e8666abd98 Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/gobughunt/bad Step #3 - "compile-libfuzzer-address-x86_64": + export bisect_bad=ecfce58965 Step #3 - "compile-libfuzzer-address-x86_64": + bisect_bad=ecfce58965 Step #3 - "compile-libfuzzer-address-x86_64": + git log e8666abd98..ecfce58965 --oneline --reverse Step #3 - "compile-libfuzzer-address-x86_64": ++ date +%d Step #3 - "compile-libfuzzer-address-x86_64": ++ wc -l gitlog.txt Step #3 - "compile-libfuzzer-address-x86_64": ++ cut '-d ' -f1 Step #3 - "compile-libfuzzer-address-x86_64": + expr '(' 04 - 1 ')' '*' 6 / 31 + 1 Step #3 - "compile-libfuzzer-address-x86_64": + cat gitlog.txt Step #3 - "compile-libfuzzer-address-x86_64": + cut '-d ' -f1 Step #3 - "compile-libfuzzer-address-x86_64": + xargs git checkout Step #3 - "compile-libfuzzer-address-x86_64": ++ cat logline.txt Step #3 - "compile-libfuzzer-address-x86_64": + sed -n 1p Step #3 - "compile-libfuzzer-address-x86_64": Note: switching to 'd4aa72002e'. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #3 - "compile-libfuzzer-address-x86_64": changes and commit them, and you can discard any commits you make in this Step #3 - "compile-libfuzzer-address-x86_64": state without impacting any branches by switching back to a branch. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": If you want to create a new branch to retain commits you create, you may Step #3 - "compile-libfuzzer-address-x86_64": do so (now or later) by using -c with the switch command. Example: Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": git switch -c Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Or undo this operation with: Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": git switch - Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at d4aa72002e cmd/asm: fix RLDCR const1,reg,const2,reg on ppc64 Step #3 - "compile-libfuzzer-address-x86_64": + ./make.bash Step #3 - "compile-libfuzzer-address-x86_64": Building Go cmd/dist using /root/.go. (go1.18 linux/amd64) Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain1 using /root/.go. Step #3 - "compile-libfuzzer-address-x86_64": Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1. Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain2 using go_bootstrap and Go toolchain1. Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain3 using go_bootstrap and Go toolchain2. Step #3 - "compile-libfuzzer-address-x86_64": Building packages and commands for linux/amd64. Step #3 - "compile-libfuzzer-address-x86_64": --- Step #3 - "compile-libfuzzer-address-x86_64": Installed Go for linux/amd64 in /src/goroot Step #3 - "compile-libfuzzer-address-x86_64": Installed commands in /src/goroot/bin Step #3 - "compile-libfuzzer-address-x86_64": + rm -Rf /root/.go/ Step #3 - "compile-libfuzzer-address-x86_64": + mv /src/goroot /root/.go Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/google/gonids FuzzParseRule fuzz_parserule Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/google/gonids: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzParseRule -o fuzz_parserule.a github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": + cd /src Step #3 - "compile-libfuzzer-address-x86_64": + unzip emerging.rules.zip Step #3 - "compile-libfuzzer-address-x86_64": Archive: emerging.rules.zip Step #3 - "compile-libfuzzer-address-x86_64": creating: rules/ Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-mobile_malware.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/botcc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/botcc.portgrouped.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/dshield.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/tor.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-tftp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-chat.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-current_events.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_server.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-policy.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/LICENSE Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-scada.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-pop3.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/drop.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-attack_response.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/sid-msg.map Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/threatview_CS_c2.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_client.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-icmp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-misc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-worm.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-p2p.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-shellcode.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-sql.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-smtp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/compromised.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/3coresec.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-rpc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-telnet.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-netbios.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/BSD-License.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-snmp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-inappropriate.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-scan.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-imap.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-dns.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_specific_apps.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/compromised-ips.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-dos.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-voip.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-info.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-icmp_info.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-deleted.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-exploit.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-ftp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-trojan.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/ciarmy.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-user_agents.rules Step #3 - "compile-libfuzzer-address-x86_64": extracting: rules/suricata-4.0-enhanced-open.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/gpl-2.0.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-games.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/classification.config Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-malware.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-activex.rules Step #3 - "compile-libfuzzer-address-x86_64": + cd rules Step #3 - "compile-libfuzzer-address-x86_64": + i=0 Step #3 - "compile-libfuzzer-address-x86_64": + mkdir corpus Step #3 - "compile-libfuzzer-address-x86_64": + set +x Step #3 - "compile-libfuzzer-address-x86_64": + zip -q -r /workspace/out/libfuzzer-address-x86_64/fuzz_parserule_seed_corpus.zip corpus Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": Using default tag: latest Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": d7bfe07ed847: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 95088a006ac2: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 923ecc5ed2f2: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 977bad896076: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2c72870b438a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c3b3b5beb00f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3bc3097a4c9c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0e749172e9ae: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3bc3097a4c9c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0e749172e9ae: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7d011a0a6413: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1331f1fb5ade: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dfe64a399623: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5f7f1c409773: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5a92f7d91890: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d335fd82b304: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": dfe64a399623: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5f7f1c409773: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5a92f7d91890: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d335fd82b304: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1331f1fb5ade: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 977bad896076: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 977bad896076: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3bc3097a4c9c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3bc3097a4c9c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 977bad896076: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2c72870b438a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2c72870b438a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e749172e9ae: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0e749172e9ae: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1331f1fb5ade: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1331f1fb5ade: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2c72870b438a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": dfe64a399623: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": dfe64a399623: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c3b3b5beb00f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5a92f7d91890: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5a92f7d91890: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d335fd82b304: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d335fd82b304: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5f7f1c409773: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5f7f1c409773: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7d011a0a6413: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7d011a0a6413: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c3b3b5beb00f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3bc3097a4c9c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0e749172e9ae: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7d011a0a6413: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1331f1fb5ade: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": dfe64a399623: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5f7f1c409773: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5a92f7d91890: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d335fd82b304: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:b657623508f1afe9637cc230b2060d131bd1b037a3ea488ce4145e81898a4a8b Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp3j_hop54/fuzz_parserule Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/gonids Step #6: adding: fuzz_parserule (deflated 66%) Step #6: adding: fuzz_parserule_seed_corpus.zip (stored 0%) Step #6: adding: llvm-symbolizer (deflated 64%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 0062f774e994: Waiting Step #7: 7eb39101e508: Waiting Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 607 0 0 100 607 0 3417 --:--:-- --:--:-- --:--:-- 3429 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 29.4M 0 0 100 29.4M 0 53.4M --:--:-- --:--:-- --:--:-- 53.4M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 15 0 0 100 15 0 54 --:--:-- --:--:-- --:--:-- 54 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 185 --:--:-- --:--:-- --:--:-- 185 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/gonids Finished Step #11 PUSH DONE