starting build "3af472d8-0ec0-4718-98d9-5b37e8bc2749" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9" Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Sending build context to Docker daemon 5.12kB Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": latest: Pulling from oss-fuzz-base/base-builder-python Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b549f31133a9: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 39bcd8a8bd9b: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6f7a9ef2e021: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a38b432e639d: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e042758d330d: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a42a8ca010ab: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ea20439cfc6c: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": bfc1f633debc: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4c6a33dcefd3: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e16b3346aa03: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 66a784769e33: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 976e4392e218: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d3860ff63ecf: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6c02f0d0f735: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ccef27e390b2: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a38b432e639d: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d1ab2403d1ef: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9b5cf5ce78fc: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b774cbd20fa1: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e042758d330d: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 85b1329f6399: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 79b69039850b: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e5abc5979fc3: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 66a784769e33: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 976e4392e218: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a42a8ca010ab: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f61f75488172: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4c6a33dcefd3: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 3db3f9dac664: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d3860ff63ecf: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e16b3346aa03: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ea20439cfc6c: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 8e593abf5010: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 5a225048c1a6: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 81c660b943d2: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 17e6b915b4fe: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6c02f0d0f735: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 85b1329f6399: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ccef27e390b2: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9141443de6f7: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 79b69039850b: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 125f4f0b4fb5: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c03c3cc9e10d: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": be4c3f030334: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 342dd6d277c1: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b72a9835d151: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4dd127fa30dc: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c95e5f2c396e: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f66a8cbb2d76: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": af1575d42bd5: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 28b3b431be60: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": bfc1f633debc: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 8e593abf5010: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 49ff3bf50d81: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f61f75488172: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c95e5f2c396e: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 5a225048c1a6: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 342dd6d277c1: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 81c660b943d2: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c03c3cc9e10d: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": be4c3f030334: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f66a8cbb2d76: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 17e6b915b4fe: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b774cbd20fa1: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9b5cf5ce78fc: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": af1575d42bd5: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 125f4f0b4fb5: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b72a9835d151: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e5abc5979fc3: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d1ab2403d1ef: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 49ff3bf50d81: Waiting Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 13e89af6d348: Pulling fs layer Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6f7a9ef2e021: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6f7a9ef2e021: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b549f31133a9: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b549f31133a9: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e042758d330d: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a38b432e639d: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a38b432e639d: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 39bcd8a8bd9b: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 39bcd8a8bd9b: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ea20439cfc6c: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ea20439cfc6c: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": bfc1f633debc: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b549f31133a9: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e16b3346aa03: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e16b3346aa03: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 66a784769e33: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 66a784769e33: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 976e4392e218: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 976e4392e218: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d3860ff63ecf: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d3860ff63ecf: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4c6a33dcefd3: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4c6a33dcefd3: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6c02f0d0f735: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6c02f0d0f735: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ccef27e390b2: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ccef27e390b2: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d1ab2403d1ef: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9b5cf5ce78fc: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9b5cf5ce78fc: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b774cbd20fa1: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b774cbd20fa1: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 85b1329f6399: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 85b1329f6399: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 79b69039850b: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e5abc5979fc3: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e5abc5979fc3: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f61f75488172: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f61f75488172: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 39bcd8a8bd9b: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6f7a9ef2e021: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a42a8ca010ab: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a42a8ca010ab: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 8e593abf5010: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 8e593abf5010: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 3db3f9dac664: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 3db3f9dac664: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 5a225048c1a6: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 5a225048c1a6: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 17e6b915b4fe: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 81c660b943d2: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 81c660b943d2: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9141443de6f7: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9141443de6f7: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 125f4f0b4fb5: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 125f4f0b4fb5: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": be4c3f030334: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": be4c3f030334: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c03c3cc9e10d: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c03c3cc9e10d: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 342dd6d277c1: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b72a9835d151: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f66a8cbb2d76: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f66a8cbb2d76: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c95e5f2c396e: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c95e5f2c396e: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": af1575d42bd5: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": af1575d42bd5: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4dd127fa30dc: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4dd127fa30dc: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a38b432e639d: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e042758d330d: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 49ff3bf50d81: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 49ff3bf50d81: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 28b3b431be60: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 28b3b431be60: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 13e89af6d348: Verifying Checksum Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 13e89af6d348: Download complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": a42a8ca010ab: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ea20439cfc6c: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": bfc1f633debc: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4c6a33dcefd3: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e16b3346aa03: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 66a784769e33: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 976e4392e218: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d3860ff63ecf: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 6c02f0d0f735: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ccef27e390b2: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": d1ab2403d1ef: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9b5cf5ce78fc: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b774cbd20fa1: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 85b1329f6399: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 79b69039850b: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": e5abc5979fc3: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f61f75488172: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 3db3f9dac664: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 8e593abf5010: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 5a225048c1a6: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 81c660b943d2: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 17e6b915b4fe: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 9141443de6f7: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 125f4f0b4fb5: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c03c3cc9e10d: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": be4c3f030334: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 342dd6d277c1: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": b72a9835d151: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 4dd127fa30dc: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": c95e5f2c396e: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": f66a8cbb2d76: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": af1575d42bd5: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 28b3b431be60: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 49ff3bf50d81: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 13e89af6d348: Pull complete Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Digest: sha256:665ed713a17ca1be2661686a764626bf0f39fddf7d44d1dc1840651b2fa71059 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> 2d9c8fb803cf Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> Running in c818e54c59f6 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Hit:1 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:2 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Hit:3 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Fetched 128 kB in 1s (232 kB/s) Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Reading package lists... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Reading package lists... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Building dependency tree... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Reading state information... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": make is already the newest version (4.2.1-1.2). Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": make set to manually installed. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": The following additional packages will be installed: Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": file libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Suggested packages: Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": | fortran95-compiler gcj-jdk Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": The following NEW packages will be installed: Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": autoconf automake file libltdl-dev libltdl7 libmagic-mgc libmagic1 libtool Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Need to get 1522 kB of archives. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": After this operation, 12.3 MB of additional disk space will be used. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Fetched 1522 kB in 0s (4590 kB/s) Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package libmagic-mgc. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../0-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking libmagic-mgc (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package libmagic1:amd64. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../1-libmagic1_1%3a5.38-4_amd64.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package file. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../2-file_1%3a5.38-4_amd64.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking file (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package autoconf. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../3-autoconf_2.69-11.1_all.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking autoconf (2.69-11.1) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package automake. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../4-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package libltdl7:amd64. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../5-libltdl7_2.4.6-14_amd64.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package libltdl-dev:amd64. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../6-libltdl-dev_2.4.6-14_amd64.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Selecting previously unselected package libtool. Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Preparing to unpack .../7-libtool_2.4.6-14_all.deb ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Unpacking libtool (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up libmagic-mgc (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up libmagic1:amd64 (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up file (1:5.38-4) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up libltdl7:amd64 (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up autoconf (2.69-11.1) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up automake (1:1.16.1-4ubuntu6) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up libtool (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Removing intermediate container c818e54c59f6 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> d1ab452319c4 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Step 3/5 : RUN git clone --depth 1 https://github.com/sigstore/model-transparency Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> Running in 4b50a67dd9d2 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Cloning into 'model-transparency'... Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Removing intermediate container 4b50a67dd9d2 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> 3fe0f9b0773d Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Step 4/5 : WORKDIR model-transparency Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> Running in 036f460f61a6 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Removing intermediate container 036f460f61a6 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> 538509a725e5 Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Step 5/5 : COPY build.sh $SRC/ Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": ---> 5f14f570fa5b Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Successfully built 5f14f570fa5b Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Successfully tagged gcr.io/oss-fuzz/model-transparency:latest Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/model-transparency:latest Finished Step #1 - "build-c70af3cd-75db-440f-9a68-a76d8657c6a9" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/model-transparency Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileRuAySO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/model-transparency/.git Step #2 - "srcmap": + GIT_DIR=/src/model-transparency Step #2 - "srcmap": + cd /src/model-transparency Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/model-transparency Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=8d54db8d5cf2fef31ca4c880057c8375d6b5e1e0 Step #2 - "srcmap": + jq_inplace /tmp/fileRuAySO '."/src/model-transparency" = { type: "git", url: "https://github.com/sigstore/model-transparency", rev: "8d54db8d5cf2fef31ca4c880057c8375d6b5e1e0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file5X2wX9 Step #2 - "srcmap": + cat /tmp/fileRuAySO Step #2 - "srcmap": + jq '."/src/model-transparency" = { type: "git", url: "https://github.com/sigstore/model-transparency", rev: "8d54db8d5cf2fef31ca4c880057c8375d6b5e1e0" }' Step #2 - "srcmap": + mv /tmp/file5X2wX9 /tmp/fileRuAySO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileRuAySO Step #2 - "srcmap": + rm /tmp/fileRuAySO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/model-transparency": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/model-transparency", Step #2 - "srcmap": "rev": "8d54db8d5cf2fef31ca4c880057c8375d6b5e1e0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + python3 -m pip install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/model-transparency Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25hCollecting asn1crypto (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading asn1crypto-1.5.1-py2.py3-none-any.whl.metadata (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting click (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading click-8.3.0-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting cryptography (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cryptography-46.0.1-cp311-abi3-manylinux_2_28_x86_64.whl.metadata (5.7 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting in-toto-attestation (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading in_toto_attestation-0.9.3-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore-protobuf-specs==0.3.2 (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_protobuf_specs-0.3.2-py3-none-any.whl.metadata (1.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore>=4.0 (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore-4.0.0-py3-none-any.whl.metadata (16 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting typing-extensions (from model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_extensions-4.15.0-py3-none-any.whl.metadata (3.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting betterproto==2.0.0b6 (from sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading betterproto-2.0.0b6-py3-none-any.whl.metadata (17 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting grpclib<0.5.0,>=0.4.1 (from betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading grpclib-0.4.8-py3-none-any.whl.metadata (6.1 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting python-dateutil<3.0,>=2.8 (from betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl.metadata (8.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting h2<5,>=3.1.0 (from grpclib<0.5.0,>=0.4.1->betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading h2-4.3.0-py3-none-any.whl.metadata (5.1 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting multidict (from grpclib<0.5.0,>=0.4.1->betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading multidict-6.6.4-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl.metadata (5.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting hyperframe<7,>=6.1 (from h2<5,>=3.1.0->grpclib<0.5.0,>=0.4.1->betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading hyperframe-6.1.0-py3-none-any.whl.metadata (4.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting hpack<5,>=4.1 (from h2<5,>=3.1.0->grpclib<0.5.0,>=0.4.1->betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading hpack-4.1.0-py3-none-any.whl.metadata (4.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Requirement already satisfied: six>=1.5 in /usr/local/lib/python3.11/site-packages (from python-dateutil<3.0,>=2.8->betterproto==2.0.0b6->sigstore-protobuf-specs==0.3.2->model-signing==1.0.1) (1.15.0) Step #3 - "compile-libfuzzer-address-x86_64": Collecting id>=1.1.0 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading id-1.5.0-py3-none-any.whl.metadata (5.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyasn1~=0.6 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyasn1-0.6.1-py3-none-any.whl.metadata (8.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pydantic<3,>=2 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic-2.11.9-py3-none-any.whl.metadata (68 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyjwt>=2.1 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading PyJWT-2.10.1-py3-none-any.whl.metadata (4.0 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyOpenSSL>=23.0.0 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyopenssl-25.3.0-py3-none-any.whl.metadata (17 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting requests (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading requests-2.32.5-py3-none-any.whl.metadata (4.9 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rich<15,>=13 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rich-14.1.0-py3-none-any.whl.metadata (18 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rfc8785~=0.1.2 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rfc8785-0.1.4-py3-none-any.whl.metadata (3.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rfc3161-client<1.1.0,>=1.0.3 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rfc3161_client-1.0.5-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (5.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore-models==0.0.5 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_models-0.0.5-py3-none-any.whl.metadata (1.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore-rekor-types==0.0.18 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_rekor_types-0.0.18-py3-none-any.whl.metadata (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting tuf~=6.0 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading tuf-6.0.0-py3-none-any.whl.metadata (8.1 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting platformdirs~=4.2 (from sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading platformdirs-4.4.0-py3-none-any.whl.metadata (12 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting cffi>=2.0.0 (from cryptography->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cffi-2.0.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting annotated-types>=0.6.0 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading annotated_types-0.7.0-py3-none-any.whl.metadata (15 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pydantic-core==2.33.2 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic_core-2.33.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (6.8 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting typing-inspection>=0.4.0 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_inspection-0.4.1-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting email-validator>=2.0.0 (from pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading email_validator-2.3.0-py3-none-any.whl.metadata (26 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting markdown-it-py>=2.2.0 (from rich<15,>=13->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading markdown_it_py-4.0.0-py3-none-any.whl.metadata (7.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pygments<3.0.0,>=2.13.0 (from rich<15,>=13->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pygments-2.19.2-py3-none-any.whl.metadata (2.5 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting securesystemslib~=1.0 (from tuf~=6.0->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading securesystemslib-1.3.1-py3-none-any.whl.metadata (4.8 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting urllib3<3,>=1.21.1 (from tuf~=6.0->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading urllib3-2.5.0-py3-none-any.whl.metadata (6.5 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pycparser (from cffi>=2.0.0->cryptography->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pycparser-2.23-py3-none-any.whl.metadata (993 bytes) Step #3 - "compile-libfuzzer-address-x86_64": Collecting dnspython>=2.0.0 (from email-validator>=2.0.0->pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading dnspython-2.8.0-py3-none-any.whl.metadata (5.7 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting idna>=2.0.0 (from email-validator>=2.0.0->pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.10-py3-none-any.whl.metadata (10 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting mdurl~=0.1 (from markdown-it-py>=2.2.0->rich<15,>=13->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading mdurl-0.1.2-py3-none-any.whl.metadata (1.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting protobuf (from in-toto-attestation->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading protobuf-6.32.1-cp39-abi3-manylinux2014_x86_64.whl.metadata (593 bytes) Step #3 - "compile-libfuzzer-address-x86_64": Collecting charset_normalizer<4,>=2 (from requests->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading charset_normalizer-3.4.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl.metadata (36 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting certifi>=2017.4.17 (from requests->sigstore>=4.0->model-signing==1.0.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading certifi-2025.8.3-py3-none-any.whl.metadata (2.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_protobuf_specs-0.3.2-py3-none-any.whl (24 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading betterproto-2.0.0b6-py3-none-any.whl (64 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading grpclib-0.4.8-py3-none-any.whl (76 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading h2-4.3.0-py3-none-any.whl (61 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading hpack-4.1.0-py3-none-any.whl (34 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading hyperframe-6.1.0-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading python_dateutil-2.9.0.post0-py2.py3-none-any.whl (229 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore-4.0.0-py3-none-any.whl (108 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_models-0.0.5-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_rekor_types-0.0.18-py3-none-any.whl (20 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cryptography-46.0.1-cp311-abi3-manylinux_2_28_x86_64.whl (4.6 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/4.6 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 4.6/4.6 MB 87.8 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading platformdirs-4.4.0-py3-none-any.whl (18 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyasn1-0.6.1-py3-none-any.whl (83 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic-2.11.9-py3-none-any.whl (444 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic_core-2.33.2-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.0 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/2.0 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 2.0/2.0 MB 108.7 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading rfc3161_client-1.0.5-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.1 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/2.1 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 2.1/2.1 MB 101.9 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading rfc8785-0.1.4-py3-none-any.whl (9.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rich-14.1.0-py3-none-any.whl (243 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pygments-2.19.2-py3-none-any.whl (1.2 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/1.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1.2/1.2 MB 76.3 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading tuf-6.0.0-py3-none-any.whl (54 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading securesystemslib-1.3.1-py3-none-any.whl (871 kB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/871.4 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 871.4/871.4 kB 54.9 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading urllib3-2.5.0-py3-none-any.whl (129 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading annotated_types-0.7.0-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cffi-2.0.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (215 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading email_validator-2.3.0-py3-none-any.whl (35 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading dnspython-2.8.0-py3-none-any.whl (331 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading id-1.5.0-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.10-py3-none-any.whl (70 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading markdown_it_py-4.0.0-py3-none-any.whl (87 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading mdurl-0.1.2-py3-none-any.whl (10.0 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading PyJWT-2.10.1-py3-none-any.whl (22 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyopenssl-25.3.0-py3-none-any.whl (57 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_extensions-4.15.0-py3-none-any.whl (44 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_inspection-0.4.1-py3-none-any.whl (14 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading asn1crypto-1.5.1-py2.py3-none-any.whl (105 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading click-8.3.0-py3-none-any.whl (107 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading in_toto_attestation-0.9.3-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading multidict-6.6.4-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (246 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading protobuf-6.32.1-cp39-abi3-manylinux2014_x86_64.whl (322 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pycparser-2.23-py3-none-any.whl (118 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading requests-2.32.5-py3-none-any.whl (64 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading charset_normalizer-3.4.3-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (150 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading certifi-2025.8.3-py3-none-any.whl (161 kB) Step #3 - "compile-libfuzzer-address-x86_64": Building wheels for collected packages: model-signing Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for model-signing (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for model-signing: filename=model_signing-1.0.1-py3-none-any.whl size=74929 sha256=166b8fb17cd5ac70fa12cd36ef41d7971314ec8a0ae7851e252d1fe5674331ee Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /root/.cache/pip/wheels/a1/02/87/8b89f995b84ccdbf992ed9ce50d5f8daca7ee55f7f347ab63b Step #3 - "compile-libfuzzer-address-x86_64": Successfully built model-signing Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: asn1crypto, urllib3, typing-extensions, securesystemslib, rfc8785, python-dateutil, pyjwt, pygments, pycparser, pyasn1, protobuf, platformdirs, multidict, mdurl, idna, hyperframe, hpack, dnspython, click, charset_normalizer, certifi, annotated-types, typing-inspection, tuf, requests, pydantic-core, markdown-it-py, in-toto-attestation, h2, email-validator, cffi, rich, pydantic, id, grpclib, cryptography, sigstore-models, rfc3161-client, pyOpenSSL, betterproto, sigstore-rekor-types, sigstore-protobuf-specs, sigstore, model-signing Step #3 - "compile-libfuzzer-address-x86_64": [?25l  ━╸━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  2/44 [typing-extensions]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/44 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/44 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/44 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/44 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/44 [pygments]  ━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  8/44 [pycparser]  ━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 10/44 [protobuf]  ━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━━━ 14/44 [idna]  ━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━ 17/44 [dnspython]  ━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━ 19/44 [charset_normalizer]  ━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━ 25/44 [pydantic-core]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━━ 30/44 [cffi]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━━ 31/44 [rich]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━ 32/44 [pydantic]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━ 34/44 [grpclib]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━ 35/44 [cryptography]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━ 41/44 [sigstore-protobuf-specs]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 44/44 [model-signing] Step #3 - "compile-libfuzzer-address-x86_64": [?25h Successfully installed annotated-types-0.7.0 asn1crypto-1.5.1 betterproto-2.0.0b6 certifi-2025.8.3 cffi-2.0.0 charset_normalizer-3.4.3 click-8.3.0 cryptography-46.0.1 dnspython-2.8.0 email-validator-2.3.0 grpclib-0.4.8 h2-4.3.0 hpack-4.1.0 hyperframe-6.1.0 id-1.5.0 idna-3.10 in-toto-attestation-0.9.3 markdown-it-py-4.0.0 mdurl-0.1.2 model-signing-1.0.1 multidict-6.6.4 platformdirs-4.4.0 protobuf-6.32.1 pyOpenSSL-25.3.0 pyasn1-0.6.1 pycparser-2.23 pydantic-2.11.9 pydantic-core-2.33.2 pygments-2.19.2 pyjwt-2.10.1 python-dateutil-2.9.0.post0 requests-2.32.5 rfc3161-client-1.0.5 rfc8785-0.1.4 rich-14.1.0 securesystemslib-1.3.1 sigstore-4.0.0 sigstore-models-0.0.5 sigstore-protobuf-specs-0.3.2 sigstore-rekor-types-0.0.18 tuf-6.0.0 typing-extensions-4.15.0 typing-inspection-0.4.1 urllib3-2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src/model-transparency/tests/fuzzing -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_with_invalid_key --onefile --name fuzz_sign_with_invalid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: wrote /src/model-transparency/fuzz_sign_with_invalid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 76 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 173 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 889 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 961 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2307 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3760 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3843 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3852 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3852 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 3855 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3915 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4351 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4529 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4530 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8346 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8483 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9094 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9421 INFO: Processing standard module hook 'hook-dateutil.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9552 INFO: Processing pre-safe-import-module hook 'hook-six.moves.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 9803 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10664 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10664 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 10670 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10677 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10677 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 10846 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10921 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10953 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11154 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11155 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11156 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11156 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 11166 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11167 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 11188 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11188 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 11210 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11210 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 11217 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11217 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 11345 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11345 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 11547 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11547 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 11666 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 11830 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11831 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 11927 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11928 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 12456 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12636 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12643 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12703 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12704 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 13053 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/python3.11/site-packages/pydantic/experimental/__init__.py:7: PydanticExperimentalWarning: This module is experimental, its contents are subject to change and deprecation. Step #3 - "compile-libfuzzer-address-x86_64": warnings.warn( Step #3 - "compile-libfuzzer-address-x86_64": 13836 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15415 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16420 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17568 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17873 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 19016 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 19417 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19417 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 19504 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19505 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 22366 INFO: Performing binary vs. data reclassification (122 entries) Step #3 - "compile-libfuzzer-address-x86_64": 22371 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 22396 WARNING: Library user32 required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22441 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22489 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 22497 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22499 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22500 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22502 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22503 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22541 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22564 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 23231 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/warn-fuzz_sign_with_invalid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 23303 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/xref-fuzz_sign_with_invalid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 23333 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 23334 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23334 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 24530 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 24560 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 24560 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 24560 INFO: Building PKG (CArchive) fuzz_sign_with_invalid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40699 INFO: Building PKG (CArchive) fuzz_sign_with_invalid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40703 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 40836 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_with_invalid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key --onefile --name fuzz_sign_verify_with_valid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: wrote /src/model-transparency/fuzz_sign_verify_with_valid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 77 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 166 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 166 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 166 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 166 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 166 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 174 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 762 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 848 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2235 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3654 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3725 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3734 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3734 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 3739 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3815 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4252 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4428 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4428 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8300 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8432 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9029 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9341 INFO: Processing standard module hook 'hook-dateutil.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9467 INFO: Processing pre-safe-import-module hook 'hook-six.moves.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 9707 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10598 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10598 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 10603 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10610 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10610 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 10783 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10834 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10894 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11081 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11082 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11083 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11083 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 11091 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11092 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 11112 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11113 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 11132 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11132 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 11139 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11139 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 11271 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11271 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 11473 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11474 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 11563 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 11772 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11772 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 11869 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11869 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 12426 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12618 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12626 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12686 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12687 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 13031 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/python3.11/site-packages/pydantic/experimental/__init__.py:7: PydanticExperimentalWarning: This module is experimental, its contents are subject to change and deprecation. Step #3 - "compile-libfuzzer-address-x86_64": warnings.warn( Step #3 - "compile-libfuzzer-address-x86_64": 13775 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15417 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16396 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17602 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17886 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 18911 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 19256 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19256 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 19389 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19389 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 22222 INFO: Performing binary vs. data reclassification (122 entries) Step #3 - "compile-libfuzzer-address-x86_64": 22226 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 22251 WARNING: Library user32 required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22298 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22345 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 22353 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22355 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22356 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22357 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22359 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22363 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22389 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 23057 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/warn-fuzz_sign_verify_with_valid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 23132 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/xref-fuzz_sign_verify_with_valid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 23162 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 23162 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23162 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 24421 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 24452 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 24452 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 24452 INFO: Building PKG (CArchive) fuzz_sign_verify_with_valid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40560 INFO: Building PKG (CArchive) fuzz_sign_verify_with_valid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 40563 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 40563 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 40563 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 40563 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 40564 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40564 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 40695 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_verify_with_valid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_with_cert_chain --onefile --name fuzz_with_cert_chain.pkg /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: wrote /src/model-transparency/fuzz_with_cert_chain.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 77 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 167 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 167 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 168 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 168 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 168 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 168 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 176 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 820 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 920 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2298 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3822 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3892 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3901 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3901 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": 3912 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3987 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4427 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4719 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4720 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8647 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8851 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9441 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9630 INFO: Processing standard module hook 'hook-dateutil.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9752 INFO: Processing pre-safe-import-module hook 'hook-six.moves.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10008 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10897 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10897 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 10903 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10910 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10910 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 11075 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11128 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11197 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11395 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11395 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11397 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11397 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 11405 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11405 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 11426 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11426 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 11445 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11445 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 11452 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11452 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 11575 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11575 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 11776 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11776 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 11866 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12077 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12078 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 12177 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12177 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 12691 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12874 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12881 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12940 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12940 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 13257 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/python3.11/site-packages/pydantic/experimental/__init__.py:7: PydanticExperimentalWarning: This module is experimental, its contents are subject to change and deprecation. Step #3 - "compile-libfuzzer-address-x86_64": warnings.warn( Step #3 - "compile-libfuzzer-address-x86_64": 14037 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15625 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16607 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17790 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 18052 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 19100 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 19457 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19457 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 19569 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19569 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 22304 INFO: Performing binary vs. data reclassification (122 entries) Step #3 - "compile-libfuzzer-address-x86_64": 22309 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 22333 WARNING: Library user32 required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22379 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22427 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 22436 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22437 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22439 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22440 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22441 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22445 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22473 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 23154 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/warn-fuzz_with_cert_chain.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 23230 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/xref-fuzz_with_cert_chain.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 23261 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 23261 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23261 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 24513 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 24543 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 24543 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 24543 INFO: Building PKG (CArchive) fuzz_with_cert_chain.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40604 INFO: Building PKG (CArchive) fuzz_with_cert_chain.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 40608 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 40608 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 40608 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 40608 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 40608 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40609 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 40740 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_with_cert_chain.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key --onefile --name fuzz_sign_then_mutate_verify_with_valid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 69 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 69 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: wrote /src/model-transparency/fuzz_sign_then_mutate_verify_with_valid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 171 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 819 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 894 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2557 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 4012 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4090 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 4099 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 4099 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 4105 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 4164 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4597 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4799 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4800 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8611 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8743 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9347 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9651 INFO: Processing standard module hook 'hook-dateutil.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9772 INFO: Processing pre-safe-import-module hook 'hook-six.moves.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10020 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10890 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10890 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 10895 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10902 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10902 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 11074 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11164 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11198 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11395 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11396 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11397 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11397 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 11406 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11406 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 11428 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11428 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 11448 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11448 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 11455 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11455 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 11583 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11583 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 11794 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11795 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 11916 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12078 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12078 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 12169 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12170 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 12707 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12886 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12893 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12951 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12951 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 13286 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/python3.11/site-packages/pydantic/experimental/__init__.py:7: PydanticExperimentalWarning: This module is experimental, its contents are subject to change and deprecation. Step #3 - "compile-libfuzzer-address-x86_64": warnings.warn( Step #3 - "compile-libfuzzer-address-x86_64": 14130 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15668 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16633 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17828 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 18102 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 19182 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 19578 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19578 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 19667 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19667 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 22365 INFO: Performing binary vs. data reclassification (122 entries) Step #3 - "compile-libfuzzer-address-x86_64": 22370 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 22394 WARNING: Library user32 required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22441 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22491 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 22499 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22501 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22502 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22504 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22505 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22508 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22534 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 23208 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/warn-fuzz_sign_then_mutate_verify_with_valid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 23310 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/xref-fuzz_sign_then_mutate_verify_with_valid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 23341 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 23341 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23341 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 24554 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 24584 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 24585 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 24585 INFO: Building PKG (CArchive) fuzz_sign_then_mutate_verify_with_valid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40654 INFO: Building PKG (CArchive) fuzz_sign_then_mutate_verify_with_valid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40658 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 40789 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_then_mutate_verify_with_valid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key --onefile --name fuzz_sign_with_valid_key_verify_with_invalid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: wrote /src/model-transparency/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 173 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 661 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1025 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2251 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3764 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3836 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3846 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3846 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 3850 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3920 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4365 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4543 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4544 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8329 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8462 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9096 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9421 INFO: Processing standard module hook 'hook-dateutil.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9548 INFO: Processing pre-safe-import-module hook 'hook-six.moves.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 9781 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10645 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10645 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 10650 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10657 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 10657 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 10823 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10876 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10943 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11129 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11129 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11131 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11131 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 11139 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11140 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 11160 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11160 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 11179 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11179 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 11186 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11186 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 11300 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11300 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 11510 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11510 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 11605 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 11811 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11811 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 11912 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 11912 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 12471 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12652 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12659 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12716 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 12716 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 13043 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": /usr/local/lib/python3.11/site-packages/pydantic/experimental/__init__.py:7: PydanticExperimentalWarning: This module is experimental, its contents are subject to change and deprecation. Step #3 - "compile-libfuzzer-address-x86_64": warnings.warn( Step #3 - "compile-libfuzzer-address-x86_64": 13812 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15398 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16351 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17563 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17850 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 18935 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 19295 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19295 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 19417 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 19417 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 22226 INFO: Performing binary vs. data reclassification (122 entries) Step #3 - "compile-libfuzzer-address-x86_64": 22231 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 22256 WARNING: Library user32 required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22303 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 22352 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 22361 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22363 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22364 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22366 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22367 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22371 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 22396 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 23054 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/warn-fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 23132 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/xref-fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 23162 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 23162 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23163 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 24403 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 24434 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 24434 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 24434 INFO: Building PKG (CArchive) fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40513 INFO: Building PKG (CArchive) fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 40517 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 40647 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 39bcd8a8bd9b: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 6f7a9ef2e021: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 9dd490e100a3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2daef018adff: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 21e37d78cd1f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5d5825cdf968: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 465f9d4510e3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e470a54ca083: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0f913a43784c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e558786d2eae: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7b9e42ee34c1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 167ecaf02c0f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 842d5f41c0c4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4de8b266c88a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 93f7affd0874: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3ba20d4bf0fc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1dcde4249218: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bdd744cce1c1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c634ba61f565: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 73214dca8bb6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7ccd5955c5e2: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 801a29a9efe6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": ac58de8dbae0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5a7f9e29e96b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5ed831aa5b64: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 167ecaf02c0f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 842d5f41c0c4: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4de8b266c88a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7ccd5955c5e2: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 801a29a9efe6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 93f7affd0874: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": ac58de8dbae0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5d5825cdf968: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3ba20d4bf0fc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0f913a43784c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c634ba61f565: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5ed831aa5b64: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 465f9d4510e3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e558786d2eae: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 7b9e42ee34c1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e470a54ca083: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 21e37d78cd1f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9dd490e100a3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 9dd490e100a3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2daef018adff: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2daef018adff: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9dd490e100a3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 465f9d4510e3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 465f9d4510e3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5d5825cdf968: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5d5825cdf968: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f913a43784c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e558786d2eae: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e558786d2eae: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2daef018adff: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 21e37d78cd1f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b9e42ee34c1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e470a54ca083: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 842d5f41c0c4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 842d5f41c0c4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5d5825cdf968: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 93f7affd0874: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 465f9d4510e3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4de8b266c88a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dcde4249218: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1dcde4249218: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 167ecaf02c0f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 167ecaf02c0f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c634ba61f565: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c634ba61f565: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 73214dca8bb6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3ba20d4bf0fc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 3ba20d4bf0fc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 801a29a9efe6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 801a29a9efe6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7ccd5955c5e2: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7ccd5955c5e2: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bdd744cce1c1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bdd744cce1c1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5a7f9e29e96b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5a7f9e29e96b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5ed831aa5b64: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5ed831aa5b64: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e470a54ca083: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ac58de8dbae0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": ac58de8dbae0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f913a43784c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e558786d2eae: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7b9e42ee34c1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 167ecaf02c0f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 842d5f41c0c4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4de8b266c88a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 93f7affd0874: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3ba20d4bf0fc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dcde4249218: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": bdd744cce1c1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c634ba61f565: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 73214dca8bb6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 7ccd5955c5e2: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 801a29a9efe6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": ac58de8dbae0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5a7f9e29e96b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5ed831aa5b64: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:b701011cda7c8cf3bcff52899ab243966ca912a9fd2b0d99ded8f3f6eafac0ac Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp60u3hkxi/fuzz_sign_with_valid_key_verify_with_invalid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp60u3hkxi/fuzz_sign_then_mutate_verify_with_valid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp60u3hkxi/fuzz_sign_with_invalid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp60u3hkxi/fuzz_with_cert_chain Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmp60u3hkxi/fuzz_sign_verify_with_valid_key Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/model-transparency Step #6: adding: fuzz_sign_then_mutate_verify_with_valid_key (deflated 38%) Step #6: adding: fuzz_sign_then_mutate_verify_with_valid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_verify_with_valid_key (deflated 36%) Step #6: adding: fuzz_sign_verify_with_valid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_with_invalid_key (deflated 35%) Step #6: adding: fuzz_sign_with_invalid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_with_valid_key_verify_with_invalid_key (deflated 41%) Step #6: adding: fuzz_sign_with_valid_key_verify_with_invalid_key.pkg (deflated 1%) Step #6: adding: fuzz_with_cert_chain (deflated 34%) Step #6: adding: fuzz_with_cert_chain.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 65%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 72%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 7eb39101e508: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 89257482f398: Waiting Step #7: 0062f774e994: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 173 0 0 100 173 0 875 --:--:-- --:--:-- --:--:-- 878 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 43 233M 0 0 43 102M 0 171M 0:00:01 --:--:-- 0:00:01 171M 100 233M 0 0 100 233M 0 139M 0:00:01 0:00:01 --:--:-- 139M 100 233M 0 0 100 233M 0 139M 0:00:01 0:00:01 --:--:-- 139M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 173 0 0 100 173 0 697 --:--:-- --:--:-- --:--:-- 700 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 43 0 0 100 43 0 200 --:--:-- --:--:-- --:--:-- 200 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/model-transparency Finished Step #11 PUSH DONE