starting build "fa1e00b7-57ab-4fe6-ac86-76a314a1c6c3" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 10.75kB Step #1: Step 1/8 : FROM gcr.io/oss-fuzz-base/base-builder-go Step #1: latest: Pulling from oss-fuzz-base/base-builder-go Step #1: d7bfe07ed847: Pulling fs layer Step #1: 14d14c89bc6a: Pulling fs layer Step #1: 460f04cf85ce: Pulling fs layer Step #1: c22b07331dbb: Pulling fs layer Step #1: 89dc96998543: Pulling fs layer Step #1: d70069bdd4c5: Pulling fs layer Step #1: cf339d444912: Pulling fs layer Step #1: 55534f60bb72: Pulling fs layer Step #1: 1742c590a889: Pulling fs layer Step #1: b65ae41923c2: Pulling fs layer Step #1: b7d64cb47bd4: Pulling fs layer Step #1: 1e46552c6f69: Pulling fs layer Step #1: 1cc926475ebb: Pulling fs layer Step #1: 829f56a32755: Pulling fs layer Step #1: bb06e075918b: Pulling fs layer Step #1: bd01d10377e3: Pulling fs layer Step #1: c1586735a7b7: Pulling fs layer Step #1: 913241aca929: Pulling fs layer Step #1: 8074db520440: Pulling fs layer Step #1: 73b8a80f175b: Pulling fs layer Step #1: f9946fd662e7: Pulling fs layer Step #1: d29473082d7b: Pulling fs layer Step #1: 84da27b06c43: Pulling fs layer Step #1: d6ac273a57cd: Pulling fs layer Step #1: c22b07331dbb: Waiting Step #1: 89dc96998543: Waiting Step #1: d70069bdd4c5: Waiting Step #1: d29473082d7b: Waiting Step #1: b65ae41923c2: Waiting Step #1: f9946fd662e7: Waiting Step #1: 829f56a32755: Waiting Step #1: 55534f60bb72: Waiting Step #1: d6ac273a57cd: Waiting Step #1: cf339d444912: Waiting Step #1: 73b8a80f175b: Waiting Step #1: 1742c590a889: Waiting Step #1: b7d64cb47bd4: Waiting Step #1: 1cc926475ebb: Waiting Step #1: bd01d10377e3: Waiting Step #1: 913241aca929: Waiting Step #1: 84da27b06c43: Waiting Step #1: c1586735a7b7: Waiting Step #1: 1e46552c6f69: Waiting Step #1: 460f04cf85ce: Download complete Step #1: d7bfe07ed847: Verifying Checksum Step #1: d7bfe07ed847: Download complete Step #1: c22b07331dbb: Verifying Checksum Step #1: c22b07331dbb: Download complete Step #1: d70069bdd4c5: Download complete Step #1: 14d14c89bc6a: Verifying Checksum Step #1: 14d14c89bc6a: Download complete Step #1: 89dc96998543: Verifying Checksum Step #1: 89dc96998543: Download complete Step #1: 55534f60bb72: Verifying Checksum Step #1: 55534f60bb72: Download complete Step #1: b65ae41923c2: Verifying Checksum Step #1: b65ae41923c2: Download complete Step #1: b7d64cb47bd4: Verifying Checksum Step #1: b7d64cb47bd4: Download complete Step #1: 1e46552c6f69: Verifying Checksum Step #1: 1e46552c6f69: Download complete Step #1: d7bfe07ed847: Pull complete Step #1: 1cc926475ebb: Download complete Step #1: 829f56a32755: Download complete Step #1: bb06e075918b: Verifying Checksum Step #1: bb06e075918b: Download complete Step #1: bd01d10377e3: Verifying Checksum Step #1: bd01d10377e3: Download complete Step #1: c1586735a7b7: Verifying Checksum Step #1: c1586735a7b7: Download complete Step #1: 913241aca929: Download complete Step #1: 8074db520440: Verifying Checksum Step #1: 8074db520440: Download complete Step #1: 73b8a80f175b: Verifying Checksum Step #1: 73b8a80f175b: Download complete Step #1: f9946fd662e7: Download complete Step #1: d29473082d7b: Verifying Checksum Step #1: d29473082d7b: Download complete Step #1: 1742c590a889: Verifying Checksum Step #1: 1742c590a889: Download complete Step #1: d6ac273a57cd: Download complete Step #1: cf339d444912: Verifying Checksum Step #1: cf339d444912: Download complete Step #1: 14d14c89bc6a: Pull complete Step #1: 460f04cf85ce: Pull complete Step #1: 84da27b06c43: Verifying Checksum Step #1: 84da27b06c43: Download complete Step #1: c22b07331dbb: Pull complete Step #1: 89dc96998543: Pull complete Step #1: d70069bdd4c5: Pull complete Step #1: cf339d444912: Pull complete Step #1: 55534f60bb72: Pull complete Step #1: 1742c590a889: Pull complete Step #1: b65ae41923c2: Pull complete Step #1: b7d64cb47bd4: Pull complete Step #1: 1e46552c6f69: Pull complete Step #1: 1cc926475ebb: Pull complete Step #1: 829f56a32755: Pull complete Step #1: bb06e075918b: Pull complete Step #1: bd01d10377e3: Pull complete Step #1: c1586735a7b7: Pull complete Step #1: 913241aca929: Pull complete Step #1: 8074db520440: Pull complete Step #1: 73b8a80f175b: Pull complete Step #1: f9946fd662e7: Pull complete Step #1: d29473082d7b: Pull complete Step #1: 84da27b06c43: Pull complete Step #1: d6ac273a57cd: Pull complete Step #1: Digest: sha256:fed02604a9d448d5ce4595f2176aebdc7f34a69fd37cd5bfdfeb8b5375549c60 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-go:latest Step #1: ---> d45ead23c8bd Step #1: Step 2/8 : RUN git clone --depth 1 https://github.com/catenacyber/gobughunt Step #1: ---> Running in d3ca54e4c38b Step #1: Cloning into 'gobughunt'... Step #1: Removing intermediate container d3ca54e4c38b Step #1: ---> 12ad0648356c Step #1: Step 3/8 : RUN git clone https://go.googlesource.com/go goroot Step #1: ---> Running in ab3d74964e03 Step #1: Cloning into 'goroot'... Step #1: Updating files: 72% (8496/11729) Updating files: 73% (8563/11729) Updating files: 74% (8680/11729) Updating files: 75% (8797/11729) Updating files: 76% (8915/11729) Updating files: 77% (9032/11729) Updating files: 78% (9149/11729) Updating files: 79% (9266/11729) Updating files: 80% (9384/11729) Updating files: 81% (9501/11729) Updating files: 82% (9618/11729) Updating files: 83% (9736/11729) Updating files: 84% (9853/11729) Updating files: 85% (9970/11729) Updating files: 86% (10087/11729) Updating files: 87% (10205/11729) Updating files: 88% (10322/11729) Updating files: 89% (10439/11729) Updating files: 90% (10557/11729) Updating files: 91% (10674/11729) Updating files: 92% (10791/11729) Updating files: 93% (10908/11729) Updating files: 94% (11026/11729) Updating files: 95% (11143/11729) Updating files: 96% (11260/11729) Updating files: 97% (11378/11729) Updating files: 98% (11495/11729) Updating files: 99% (11612/11729) Updating files: 100% (11729/11729) Updating files: 100% (11729/11729), done. Step #1: Removing intermediate container ab3d74964e03 Step #1: ---> 56daf55d7962 Step #1: Step 4/8 : RUN git clone --depth 1 https://github.com/google/gonids Step #1: ---> Running in 9a3750427ed1 Step #1: Cloning into 'gonids'... Step #1: Removing intermediate container 9a3750427ed1 Step #1: ---> 93a2513a139f Step #1: Step 5/8 : ADD https://rules.emergingthreats.net/open/suricata/emerging.rules.zip emerging.rules.zip Step #1: Step #1: Step #1: ---> a87c35a9b1e4 Step #1: Step 6/8 : COPY build.sh $SRC/ Step #1: ---> 9cf1b56da556 Step #1: Step 7/8 : COPY *.diff $SRC/ Step #1: ---> 1ebfcd1df9fc Step #1: Step 8/8 : WORKDIR $SRC/gonids Step #1: ---> Running in 8377a2c8874c Step #1: Removing intermediate container 8377a2c8874c Step #1: ---> 355a342af2f8 Step #1: Successfully built 355a342af2f8 Step #1: Successfully tagged gcr.io/oss-fuzz/gonids:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/gonids Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileN4EdgP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ go == \g\o ]] Step #2 - "srcmap": + PATHS_TO_SCAN='/src /root/go' Step #2 - "srcmap": ++ find /src /root/go -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gonids/.git Step #2 - "srcmap": + GIT_DIR=/src/gonids Step #2 - "srcmap": + cd /src/gonids Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/google/gonids Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=4d00a2956aaa66dafe6062a33b7c1af420fe78e7 Step #2 - "srcmap": + jq_inplace /tmp/fileN4EdgP '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filepapIha Step #2 - "srcmap": + cat /tmp/fileN4EdgP Step #2 - "srcmap": + jq '."/src/gonids" = { type: "git", url: "https://github.com/google/gonids", rev: "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" }' Step #2 - "srcmap": + mv /tmp/filepapIha /tmp/fileN4EdgP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/goroot/.git Step #2 - "srcmap": + GIT_DIR=/src/goroot Step #2 - "srcmap": + cd /src/goroot Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://go.googlesource.com/go Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=ceda93ed673294f0ce5eb3a723d563091bff0a39 Step #2 - "srcmap": + jq_inplace /tmp/fileN4EdgP '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "ceda93ed673294f0ce5eb3a723d563091bff0a39" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filexjdDmG Step #2 - "srcmap": + cat /tmp/fileN4EdgP Step #2 - "srcmap": + jq '."/src/goroot" = { type: "git", url: "https://go.googlesource.com/go", rev: "ceda93ed673294f0ce5eb3a723d563091bff0a39" }' Step #2 - "srcmap": + mv /tmp/filexjdDmG /tmp/fileN4EdgP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/gobughunt/.git Step #2 - "srcmap": + GIT_DIR=/src/gobughunt Step #2 - "srcmap": + cd /src/gobughunt Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/catenacyber/gobughunt Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=e62d987845de0cb962907e73ea3e4f2245e6791f Step #2 - "srcmap": + jq_inplace /tmp/fileN4EdgP '."/src/gobughunt" = { type: "git", url: "https://github.com/catenacyber/gobughunt", rev: "e62d987845de0cb962907e73ea3e4f2245e6791f" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileOuklih Step #2 - "srcmap": + cat /tmp/fileN4EdgP Step #2 - "srcmap": + jq '."/src/gobughunt" = { type: "git", url: "https://github.com/catenacyber/gobughunt", rev: "e62d987845de0cb962907e73ea3e4f2245e6791f" }' Step #2 - "srcmap": + mv /tmp/fileOuklih /tmp/fileN4EdgP Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/aflplusplus/.git Step #2 - "srcmap": + GIT_DIR=/src/aflplusplus Step #2 - "srcmap": + cd /src/aflplusplus Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/AFLplusplus/AFLplusplus.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c208dcf9c573e3d85990c7dea777646f7fa4961c Step #2 - "srcmap": + jq_inplace /tmp/fileN4EdgP '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehuzc8J Step #2 - "srcmap": + cat /tmp/fileN4EdgP Step #2 - "srcmap": + jq '."/src/aflplusplus" = { type: "git", url: "https://github.com/AFLplusplus/AFLplusplus.git", rev: "c208dcf9c573e3d85990c7dea777646f7fa4961c" }' Step #2 - "srcmap": + mv /tmp/filehuzc8J /tmp/fileN4EdgP Step #2 - "srcmap": ++ find /src /root/go -name .svn -type d Step #2 - "srcmap": ++ find /src /root/go -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileN4EdgP Step #2 - "srcmap": + rm /tmp/fileN4EdgP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/gonids": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/google/gonids", Step #2 - "srcmap": "rev": "4d00a2956aaa66dafe6062a33b7c1af420fe78e7" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/goroot": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://go.googlesource.com/go", Step #2 - "srcmap": "rev": "ceda93ed673294f0ce5eb3a723d563091bff0a39" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/gobughunt": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/catenacyber/gobughunt", Step #2 - "srcmap": "rev": "e62d987845de0cb962907e73ea3e4f2245e6791f" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/aflplusplus": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/AFLplusplus/AFLplusplus.git", Step #2 - "srcmap": "rev": "c208dcf9c573e3d85990c7dea777646f7fa4961c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image: gcr.io/oss-fuzz/gonids Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + cd /src/goroot/src Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/gobughunt/good Step #3 - "compile-libfuzzer-address-x86_64": + export bisect_good=d4aa72002e Step #3 - "compile-libfuzzer-address-x86_64": + bisect_good=d4aa72002e Step #3 - "compile-libfuzzer-address-x86_64": ++ cat /src/gobughunt/bad Step #3 - "compile-libfuzzer-address-x86_64": + export bisect_bad=ecfce58965 Step #3 - "compile-libfuzzer-address-x86_64": + bisect_bad=ecfce58965 Step #3 - "compile-libfuzzer-address-x86_64": + git log d4aa72002e..ecfce58965 --oneline --reverse Step #3 - "compile-libfuzzer-address-x86_64": ++ date +%d Step #3 - "compile-libfuzzer-address-x86_64": ++ wc -l gitlog.txt Step #3 - "compile-libfuzzer-address-x86_64": ++ cut '-d ' -f1 Step #3 - "compile-libfuzzer-address-x86_64": + expr '(' 05 - 1 ')' '*' 5 / 31 + 1 Step #3 - "compile-libfuzzer-address-x86_64": + cat gitlog.txt Step #3 - "compile-libfuzzer-address-x86_64": + cut '-d ' -f1 Step #3 - "compile-libfuzzer-address-x86_64": + xargs git checkout Step #3 - "compile-libfuzzer-address-x86_64": ++ cat logline.txt Step #3 - "compile-libfuzzer-address-x86_64": + sed -n 1p Step #3 - "compile-libfuzzer-address-x86_64": Note: switching to '537cde0b4b'. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": You are in 'detached HEAD' state. You can look around, make experimental Step #3 - "compile-libfuzzer-address-x86_64": changes and commit them, and you can discard any commits you make in this Step #3 - "compile-libfuzzer-address-x86_64": state without impacting any branches by switching back to a branch. Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": If you want to create a new branch to retain commits you create, you may Step #3 - "compile-libfuzzer-address-x86_64": do so (now or later) by using -c with the switch command. Example: Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": git switch -c Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Or undo this operation with: Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": git switch - Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": Turn off this advice by setting config variable advice.detachedHead to false Step #3 - "compile-libfuzzer-address-x86_64": Step #3 - "compile-libfuzzer-address-x86_64": HEAD is now at 537cde0b4b cmd/compile, runtime: add metadata for argument printing in traceback Step #3 - "compile-libfuzzer-address-x86_64": + ./make.bash Step #3 - "compile-libfuzzer-address-x86_64": Building Go cmd/dist using /root/.go. (go1.18 linux/amd64) Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain1 using /root/.go. Step #3 - "compile-libfuzzer-address-x86_64": Building Go bootstrap cmd/go (go_bootstrap) using Go toolchain1. Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain2 using go_bootstrap and Go toolchain1. Step #3 - "compile-libfuzzer-address-x86_64": Building Go toolchain3 using go_bootstrap and Go toolchain2. Step #3 - "compile-libfuzzer-address-x86_64": Building packages and commands for linux/amd64. Step #3 - "compile-libfuzzer-address-x86_64": --- Step #3 - "compile-libfuzzer-address-x86_64": Installed Go for linux/amd64 in /src/goroot Step #3 - "compile-libfuzzer-address-x86_64": Installed commands in /src/goroot/bin Step #3 - "compile-libfuzzer-address-x86_64": + rm -Rf /root/.go/ Step #3 - "compile-libfuzzer-address-x86_64": + mv /src/goroot /root/.go Step #3 - "compile-libfuzzer-address-x86_64": + compile_go_fuzzer github.com/google/gonids FuzzParseRule fuzz_parserule Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/bin/compile_go_fuzzer: line 28: cd: /root/go/src/github.com/google/gonids: No such file or directory Step #3 - "compile-libfuzzer-address-x86_64": go: downloading github.com/kylelemons/godebug v1.1.0 Step #3 - "compile-libfuzzer-address-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": Running go-fuzz -tags gofuzz -func FuzzParseRule -o fuzz_parserule.a github.com/google/gonids Step #3 - "compile-libfuzzer-address-x86_64": + cd /src Step #3 - "compile-libfuzzer-address-x86_64": + unzip emerging.rules.zip Step #3 - "compile-libfuzzer-address-x86_64": Archive: emerging.rules.zip Step #3 - "compile-libfuzzer-address-x86_64": creating: rules/ Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-mobile_malware.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/botcc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/botcc.portgrouped.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/dshield.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/tor.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-tftp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-chat.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-current_events.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_server.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-policy.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/LICENSE Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-scada.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-pop3.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/drop.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-attack_response.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/sid-msg.map Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/threatview_CS_c2.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_client.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-icmp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-misc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-worm.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-p2p.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-shellcode.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-sql.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-smtp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/compromised.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/3coresec.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-rpc.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-telnet.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-netbios.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/BSD-License.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-snmp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-inappropriate.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-scan.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-imap.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-dns.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-web_specific_apps.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/compromised-ips.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-dos.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-voip.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-info.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-icmp_info.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-deleted.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-exploit.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-ftp.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-trojan.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/ciarmy.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-user_agents.rules Step #3 - "compile-libfuzzer-address-x86_64": extracting: rules/suricata-4.0-enhanced-open.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/gpl-2.0.txt Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-games.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/classification.config Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-malware.rules Step #3 - "compile-libfuzzer-address-x86_64": inflating: rules/emerging-activex.rules Step #3 - "compile-libfuzzer-address-x86_64": + cd rules Step #3 - "compile-libfuzzer-address-x86_64": + i=0 Step #3 - "compile-libfuzzer-address-x86_64": + mkdir corpus Step #3 - "compile-libfuzzer-address-x86_64": + set +x Step #3 - "compile-libfuzzer-address-x86_64": + zip -q -r /workspace/out/libfuzzer-address-x86_64/fuzz_parserule_seed_corpus.zip corpus Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": Using default tag: latest Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": d7bfe07ed847: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 14d14c89bc6a: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 460f04cf85ce: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 7c95e4cbc178: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 37bc0f35439c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": cd7b196e6fa4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0d71982e88c2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 852714226e56: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 464239612886: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c27f6f776740: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7b3c696f1309: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 299fbbad9d62: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 23ef8f2e6d02: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7dcbdcfecd21: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 464239612886: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c27f6f776740: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7b3c696f1309: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 299fbbad9d62: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 23ef8f2e6d02: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7dcbdcfecd21: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0d71982e88c2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 852714226e56: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7c95e4cbc178: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 37bc0f35439c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0d71982e88c2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0d71982e88c2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7c95e4cbc178: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 852714226e56: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 852714226e56: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c27f6f776740: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 37bc0f35439c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b3c696f1309: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": cd7b196e6fa4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": cd7b196e6fa4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 23ef8f2e6d02: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7dcbdcfecd21: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 299fbbad9d62: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 299fbbad9d62: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 464239612886: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 464239612886: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": cd7b196e6fa4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0d71982e88c2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 852714226e56: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 464239612886: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c27f6f776740: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b3c696f1309: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 299fbbad9d62: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 23ef8f2e6d02: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7dcbdcfecd21: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:55119002ecf6d28e12a7948a386373fbeb447f99b270a944adcac2d99f9fcd2d Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp2spkf10h/fuzz_parserule Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/gonids Step #6: adding: fuzz_parserule (deflated 66%) Step #6: adding: fuzz_parserule_seed_corpus.zip (stored 0%) Step #6: adding: llvm-symbolizer (deflated 64%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 607 0 0 100 607 0 3273 --:--:-- --:--:-- --:--:-- 3281 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 29.4M 0 0 100 29.4M 0 55.0M --:--:-- --:--:-- --:--:-- 55.1M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 15 0 0 100 15 0 60 --:--:-- --:--:-- --:--:-- 60 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 31 0 0 100 31 0 173 --:--:-- --:--:-- --:--:-- 173 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/gonids Finished Step #11 PUSH DONE