starting build "d1f0fd83-7a3a-4721-8922-ccf155c6728f" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 9.216kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: 9e47fb9dd199: Pulling fs layer Step #1: 905e641a4b54: Pulling fs layer Step #1: 8fcaf59102ed: Pulling fs layer Step #1: a9c74f632174: Pulling fs layer Step #1: f013ccbc22d3: Pulling fs layer Step #1: aa7628f757ea: Pulling fs layer Step #1: 49780d3797d7: Pulling fs layer Step #1: a9c74f632174: Waiting Step #1: f013ccbc22d3: Waiting Step #1: 8bb48e7bd5aa: Pulling fs layer Step #1: aa7628f757ea: Waiting Step #1: a60c1afcc4de: Pulling fs layer Step #1: 1bf625c1f2e9: Pulling fs layer Step #1: 49780d3797d7: Waiting Step #1: 0d403ab20828: Pulling fs layer Step #1: 8bb48e7bd5aa: Waiting Step #1: a60c1afcc4de: Waiting Step #1: 1bf625c1f2e9: Waiting Step #1: 0d403ab20828: Waiting Step #1: 59b333e0d31f: Pulling fs layer Step #1: f9f618c603e5: Pulling fs layer Step #1: 51a11501906f: Pulling fs layer Step #1: f9f618c603e5: Waiting Step #1: 59b333e0d31f: Waiting Step #1: 058ec0f2cc9f: Pulling fs layer Step #1: 51a11501906f: Waiting Step #1: bf5fa999ddb8: Pulling fs layer Step #1: 058ec0f2cc9f: Waiting Step #1: 3b79056069ee: Pulling fs layer Step #1: bf5fa999ddb8: Waiting Step #1: 2af4c62c4868: Pulling fs layer Step #1: b7f4aba96676: Pulling fs layer Step #1: 3b79056069ee: Waiting Step #1: 2af4c62c4868: Waiting Step #1: b183bf4b4905: Pulling fs layer Step #1: 684bf5ceae20: Pulling fs layer Step #1: b183bf4b4905: Waiting Step #1: 9f325110a2f2: Pulling fs layer Step #1: b7f4aba96676: Waiting Step #1: 9506c77dd40c: Pulling fs layer Step #1: 684bf5ceae20: Waiting Step #1: 9fe2f424e764: Pulling fs layer Step #1: 629364863e03: Pulling fs layer Step #1: 9506c77dd40c: Waiting Step #1: 9fe2f424e764: Waiting Step #1: 629364863e03: Waiting Step #1: d2235c9c3e41: Pulling fs layer Step #1: 3ae4a153df7c: Pulling fs layer Step #1: 5363e097ce6b: Pulling fs layer Step #1: d2235c9c3e41: Waiting Step #1: edf30144e380: Pulling fs layer Step #1: 3ae4a153df7c: Waiting Step #1: f79617c57746: Pulling fs layer Step #1: edf30144e380: Waiting Step #1: f79617c57746: Waiting Step #1: 905e641a4b54: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: a9c74f632174: Download complete Step #1: 8fcaf59102ed: Verifying Checksum Step #1: 8fcaf59102ed: Download complete Step #1: f013ccbc22d3: Verifying Checksum Step #1: f013ccbc22d3: Download complete Step #1: 49780d3797d7: Verifying Checksum Step #1: 49780d3797d7: Download complete Step #1: 8bb48e7bd5aa: Verifying Checksum Step #1: 8bb48e7bd5aa: Download complete Step #1: 9e47fb9dd199: Verifying Checksum Step #1: 9e47fb9dd199: Download complete Step #1: 1bf625c1f2e9: Verifying Checksum Step #1: 1bf625c1f2e9: Download complete Step #1: 0d403ab20828: Verifying Checksum Step #1: 0d403ab20828: Download complete Step #1: b549f31133a9: Pull complete Step #1: 59b333e0d31f: Verifying Checksum Step #1: 59b333e0d31f: Download complete Step #1: f9f618c603e5: Verifying Checksum Step #1: f9f618c603e5: Download complete Step #1: 51a11501906f: Download complete Step #1: 058ec0f2cc9f: Verifying Checksum Step #1: 058ec0f2cc9f: Download complete Step #1: bf5fa999ddb8: Verifying Checksum Step #1: bf5fa999ddb8: Download complete Step #1: 3b79056069ee: Download complete Step #1: 2af4c62c4868: Verifying Checksum Step #1: 2af4c62c4868: Download complete Step #1: a60c1afcc4de: Verifying Checksum Step #1: a60c1afcc4de: Download complete Step #1: b7f4aba96676: Verifying Checksum Step #1: b7f4aba96676: Download complete Step #1: b183bf4b4905: Verifying Checksum Step #1: b183bf4b4905: Download complete Step #1: 9f325110a2f2: Verifying Checksum Step #1: 9f325110a2f2: Download complete Step #1: 684bf5ceae20: Verifying Checksum Step #1: 684bf5ceae20: Download complete Step #1: 9506c77dd40c: Verifying Checksum Step #1: 9506c77dd40c: Download complete Step #1: 9fe2f424e764: Verifying Checksum Step #1: 9fe2f424e764: Download complete Step #1: 629364863e03: Verifying Checksum Step #1: 629364863e03: Download complete Step #1: 3ae4a153df7c: Download complete Step #1: d2235c9c3e41: Verifying Checksum Step #1: d2235c9c3e41: Download complete Step #1: 5363e097ce6b: Download complete Step #1: edf30144e380: Download complete Step #1: f79617c57746: Verifying Checksum Step #1: f79617c57746: Download complete Step #1: aa7628f757ea: Verifying Checksum Step #1: aa7628f757ea: Download complete Step #1: 9e47fb9dd199: Pull complete Step #1: 905e641a4b54: Pull complete Step #1: 8fcaf59102ed: Pull complete Step #1: a9c74f632174: Pull complete Step #1: f013ccbc22d3: Pull complete Step #1: aa7628f757ea: Pull complete Step #1: 49780d3797d7: Pull complete Step #1: 8bb48e7bd5aa: Pull complete Step #1: a60c1afcc4de: Pull complete Step #1: 1bf625c1f2e9: Pull complete Step #1: 0d403ab20828: Pull complete Step #1: 59b333e0d31f: Pull complete Step #1: f9f618c603e5: Pull complete Step #1: 51a11501906f: Pull complete Step #1: 058ec0f2cc9f: Pull complete Step #1: bf5fa999ddb8: Pull complete Step #1: 3b79056069ee: Pull complete Step #1: 2af4c62c4868: Pull complete Step #1: b7f4aba96676: Pull complete Step #1: b183bf4b4905: Pull complete Step #1: 684bf5ceae20: Pull complete Step #1: 9f325110a2f2: Pull complete Step #1: 9506c77dd40c: Pull complete Step #1: 9fe2f424e764: Pull complete Step #1: 629364863e03: Pull complete Step #1: d2235c9c3e41: Pull complete Step #1: 3ae4a153df7c: Pull complete Step #1: 5363e097ce6b: Pull complete Step #1: edf30144e380: Pull complete Step #1: f79617c57746: Pull complete Step #1: Digest: sha256:b761439865b248ec8719746750fc0d9c0c8199bc0378c2a7a057421e72a0e1c5 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> ccfb45f2acd9 Step #1: Step 2/7 : RUN pip3 install requests Step #1: ---> Running in 30fe5d0cf48a Step #1: Collecting requests Step #1: Downloading https://files.pythonhosted.org/packages/c3/20/748e38b466e0819491f0ce6e90ebe4184966ee304fe483e2c414b0f4ef07/requests-2.32.2-py3-none-any.whl (63kB) Step #1: Collecting urllib3<3,>=1.21.1 (from requests) Step #1: Downloading https://files.pythonhosted.org/packages/a2/73/a68704750a7679d0b6d3ad7aa8d4da8e14e151ae82e6fee774e6e0d05ec8/urllib3-2.2.1-py3-none-any.whl (121kB) Step #1: Collecting idna<4,>=2.5 (from requests) Step #1: Downloading https://files.pythonhosted.org/packages/e5/3e/741d8c82801c347547f8a2a06aa57dbb1992be9e948df2ea0eda2c8b79e8/idna-3.7-py3-none-any.whl (66kB) Step #1: Collecting charset-normalizer<4,>=2 (from requests) Step #1: Downloading https://files.pythonhosted.org/packages/28/76/e6222113b83e3622caa4bb41032d0b1bf785250607392e1b778aca0b8a7d/charset_normalizer-3.3.2-py3-none-any.whl (48kB) Step #1: Collecting certifi>=2017.4.17 (from requests) Step #1: Downloading https://files.pythonhosted.org/packages/ba/06/a07f096c664aeb9f01624f858c3add0a4e913d6c96257acb4fce61e7de14/certifi-2024.2.2-py3-none-any.whl (163kB) Step #1: Installing collected packages: urllib3, idna, charset-normalizer, certifi, requests Step #1: Successfully installed certifi-2024.2.2 charset-normalizer-3.3.2 idna-3.7 requests-2.32.2 urllib3-2.2.1 Step #1: WARNING: You are using pip version 19.2.3, however version 24.0 is available. Step #1: You should consider upgrading via the 'pip install --upgrade pip' command. Step #1: Removing intermediate container 30fe5d0cf48a Step #1: ---> c9182ea36ae2 Step #1: Step 3/7 : RUN git clone --depth 1 https://github.com/Alan32Liu/github-scarecrow.git $SRC/github-scarecrow Step #1: ---> Running in ae22dd4b510c Step #1: Cloning into '/src/github-scarecrow'... Step #1: Removing intermediate container ae22dd4b510c Step #1: ---> 5b0bc1b7a0ee Step #1: Step 4/7 : WORKDIR $SRC/github-scarecrow Step #1: ---> Running in bed586e6addb Step #1: Removing intermediate container bed586e6addb Step #1: ---> 0ffe30297972 Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/google/oss-fuzz Step #1: ---> Running in bbdfedc757ad Step #1: Cloning into 'oss-fuzz'... Step #1: Removing intermediate container bbdfedc757ad Step #1: ---> c16b3156c9b8 Step #1: Step 6/7 : RUN cd oss-fuzz/infra/experimental/SystemSan && make Step #1: ---> Running in 3a7cf75abc77 Step #1: clang++ -std=c++17 -Wall -Wextra -O3 -g3 -Werror -lpthread -o SystemSan SystemSan.cpp inspect_dns.cpp inspect_utils.cpp Step #1: clang++ -std=c++17 -Wall -Wextra -O3 -g3 -Werror -fsanitize=address,fuzzer -o target target.cpp Step #1: clang++ -std=c++17 -Wall -Wextra -O3 -g3 -Werror -fsanitize=address,fuzzer -o target_file target_file.cpp Step #1: clang++ -std=c++17 -Wall -Wextra -O3 -g3 -Werror -fsanitize=address,fuzzer -o target_dns target_dns.cpp Step #1: Removing intermediate container 3a7cf75abc77 Step #1: ---> d99dd0329b9c Step #1: Step 7/7 : COPY shell_injection_poc_fuzzer.py fakelib.py build.sh $SRC/ Step #1: ---> 8de28af964cb Step #1: Successfully built 8de28af964cb Step #1: Successfully tagged gcr.io/oss-fuzz/github_scarecrow:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/github_scarecrow Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileUkPBqM Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/github-scarecrow/.git Step #2 - "srcmap": + GIT_DIR=/src/github-scarecrow Step #2 - "srcmap": + cd /src/github-scarecrow Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/Alan32Liu/github-scarecrow.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=0b284956321a981c7c8f87c07ae87fac7ec60461 Step #2 - "srcmap": + jq_inplace /tmp/fileUkPBqM '."/src/github-scarecrow" = { type: "git", url: "https://github.com/Alan32Liu/github-scarecrow.git", rev: "0b284956321a981c7c8f87c07ae87fac7ec60461" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filetsDN2b Step #2 - "srcmap": + cat /tmp/fileUkPBqM Step #2 - "srcmap": + jq '."/src/github-scarecrow" = { type: "git", url: "https://github.com/Alan32Liu/github-scarecrow.git", rev: "0b284956321a981c7c8f87c07ae87fac7ec60461" }' Step #2 - "srcmap": + mv /tmp/filetsDN2b /tmp/fileUkPBqM Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/github-scarecrow/oss-fuzz/.git Step #2 - "srcmap": + GIT_DIR=/src/github-scarecrow/oss-fuzz Step #2 - "srcmap": + cd /src/github-scarecrow/oss-fuzz Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/oss-fuzz Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=97a0c5a20cb33312a2e681163e8be6deec2d990f Step #2 - "srcmap": + jq_inplace /tmp/fileUkPBqM '."/src/github-scarecrow/oss-fuzz" = { type: "git", url: "https://github.com/google/oss-fuzz", rev: "97a0c5a20cb33312a2e681163e8be6deec2d990f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filejTd3NG Step #2 - "srcmap": + cat /tmp/fileUkPBqM Step #2 - "srcmap": + jq '."/src/github-scarecrow/oss-fuzz" = { type: "git", url: "https://github.com/google/oss-fuzz", rev: "97a0c5a20cb33312a2e681163e8be6deec2d990f" }' Step #2 - "srcmap": + mv /tmp/filejTd3NG /tmp/fileUkPBqM Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileUkPBqM Step #2 - "srcmap": + rm /tmp/fileUkPBqM Step #2 - "srcmap": { Step #2 - "srcmap": "/src/github-scarecrow": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/Alan32Liu/github-scarecrow.git", Step #2 - "srcmap": "rev": "0b284956321a981c7c8f87c07ae87fac7ec60461" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/github-scarecrow/oss-fuzz": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/oss-fuzz", Step #2 - "srcmap": "rev": "97a0c5a20cb33312a2e681163e8be6deec2d990f" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer ../shell_injection_poc_fuzzer.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=../shell_injection_poc_fuzzer.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py ../shell_injection_poc_fuzzer.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=shell_injection_poc_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=shell_injection_poc_fuzzer.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//shell_injection_poc_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//shell_injection_poc_fuzzer Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//shell_injection_poc_fuzzer --onefile --name shell_injection_poc_fuzzer.pkg ../shell_injection_poc_fuzzer.py Step #3 - "compile-libfuzzer-address-x86_64": 59 INFO: PyInstaller: 5.0.1 Step #3 - "compile-libfuzzer-address-x86_64": 59 INFO: Python: 3.8.3 Step #3 - "compile-libfuzzer-address-x86_64": 60 INFO: Platform: Linux-5.10.0-28-cloud-amd64-x86_64-with-glibc2.2.5 Step #3 - "compile-libfuzzer-address-x86_64": 60 INFO: wrote /src/github-scarecrow/shell_injection_poc_fuzzer.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 63 INFO: UPX is not available. Step #3 - "compile-libfuzzer-address-x86_64": 64 INFO: Extending PYTHONPATH with paths Step #3 - "compile-libfuzzer-address-x86_64": ['/src'] Step #3 - "compile-libfuzzer-address-x86_64": 290 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 290 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 290 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 291 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 301 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 3072 INFO: Processing pre-find module path hook distutils from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/pre_find_module_path/hook-distutils.py'. Step #3 - "compile-libfuzzer-address-x86_64": 3073 INFO: distutils: retargeting to non-venv dir '/usr/local/lib/python3.8' Step #3 - "compile-libfuzzer-address-x86_64": 4874 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 5032 INFO: running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 5055 INFO: Analyzing /src/shell_injection_poc_fuzzer.py Step #3 - "compile-libfuzzer-address-x86_64": 5141 INFO: Processing module hooks... Step #3 - "compile-libfuzzer-address-x86_64": 5142 INFO: Loading module hook 'hook-atheris.py' from '/usr/local/lib/python3.8/site-packages/atheris'... Step #3 - "compile-libfuzzer-address-x86_64": 5143 INFO: Loading module hook 'hook-xml.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5406 INFO: Loading module hook 'hook-pickle.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5407 INFO: Loading module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5416 INFO: Loading module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5418 INFO: Loading module hook 'hook-encodings.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5466 INFO: Loading module hook 'hook-heapq.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5468 INFO: Loading module hook 'hook-difflib.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5469 INFO: Loading module hook 'hook-distutils.py' from '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks'... Step #3 - "compile-libfuzzer-address-x86_64": 5482 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 5486 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 5490 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_subprocess.py' Step #3 - "compile-libfuzzer-address-x86_64": 5491 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_pkgutil.py' Step #3 - "compile-libfuzzer-address-x86_64": 5494 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_multiprocessing.py' Step #3 - "compile-libfuzzer-address-x86_64": 5497 INFO: Including run-time hook '/usr/local/lib/python3.8/site-packages/PyInstaller/hooks/rthooks/pyi_rth_inspect.py' Step #3 - "compile-libfuzzer-address-x86_64": 5504 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 6372 INFO: Looking for eggs Step #3 - "compile-libfuzzer-address-x86_64": 6372 INFO: Using Python library /usr/local/lib/libpython3.8.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 6376 INFO: Warnings written to /src/pyfuzzworkdir//shell_injection_poc_fuzzer/shell_injection_poc_fuzzer.pkg/warn-shell_injection_poc_fuzzer.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 6404 INFO: Graph cross-reference written to /src/pyfuzzworkdir//shell_injection_poc_fuzzer/shell_injection_poc_fuzzer.pkg/xref-shell_injection_poc_fuzzer.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 6419 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 6419 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6419 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//shell_injection_poc_fuzzer/shell_injection_poc_fuzzer.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 6836 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir//shell_injection_poc_fuzzer/shell_injection_poc_fuzzer.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 6841 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 6841 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 6841 INFO: Building PKG (CArchive) shell_injection_poc_fuzzer.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13877 INFO: Building PKG (CArchive) shell_injection_poc_fuzzer.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: Bootloader /usr/local/lib/python3.8/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/shell_injection_poc_fuzzer.pkg Step #3 - "compile-libfuzzer-address-x86_64": 13880 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 13912 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/shell_injection_poc_fuzzer.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/shell_injection_poc_fuzzer.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/shell_injection_poc_fuzzer.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/shell_injection_poc_fuzzer Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 9e47fb9dd199: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 905e641a4b54: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 83b59bf73b15: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f8c04c40c688: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4e6532c1e162: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": db8b651e5316: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c674838c692e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f82b90fd3e29: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1f8617e9eb89: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 04b600c3b42f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c8254692eae2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 499fab4d4afd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": de7e767ef113: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 535476894854: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 10dce4875af8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": b4e152850fb5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:089b107c1bd031393a38687ed4419e9004ee25de7f70f0deeb17b53250151615 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpp9cdshek/shell_injection_poc_fuzzer Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/github_scarecrow Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 67%) Step #6: adding: shell_injection_poc_fuzzer (deflated 37%) Step #6: adding: shell_injection_poc_fuzzer.pkg (deflated 1%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: d4fceeeb758e: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 339 0 0 100 339 0 1581 --:--:-- --:--:-- --:--:-- 1584 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 20.6M 0 0 100 20.6M 0 50.4M --:--:-- --:--:-- --:--:-- 50.4M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 27 0 0 100 27 0 131 --:--:-- --:--:-- --:--:-- 131 100 27 0 0 100 27 0 91 --:--:-- --:--:-- --:--:-- 91 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 41 0 0 100 41 0 199 --:--:-- --:--:-- --:--:-- 199 100 41 0 0 100 41 0 152 --:--:-- --:--:-- --:--:-- 152 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/github_scarecrow Finished Step #11 PUSH DONE