starting build "91e2d8b7-682d-4b06-806c-434bd9067710" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 8.192kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: f39d80ca7021: Pulling fs layer Step #1: 3f7b104caa94: Pulling fs layer Step #1: 98d63d9f6c98: Pulling fs layer Step #1: 18e56a74fe3b: Pulling fs layer Step #1: d374a6bee675: Pulling fs layer Step #1: ec334fd6e8fa: Pulling fs layer Step #1: e3e240b0cd50: Pulling fs layer Step #1: b2512e0eab51: Pulling fs layer Step #1: 4223d1ba77d3: Pulling fs layer Step #1: 8d45a907f5ae: Pulling fs layer Step #1: 44ae4f1bee4d: Pulling fs layer Step #1: 5e1d39d83edd: Pulling fs layer Step #1: 96c98dcd7e17: Pulling fs layer Step #1: 136e28fc29c9: Pulling fs layer Step #1: af65c42a8b64: Pulling fs layer Step #1: a144ab822a62: Pulling fs layer Step #1: bcbe3735701b: Pulling fs layer Step #1: efddb1001a19: Pulling fs layer Step #1: f2e49f1ff49e: Pulling fs layer Step #1: 2f0cc467e898: Pulling fs layer Step #1: b1b7efa61c06: Pulling fs layer Step #1: 64c91e3d268f: Pulling fs layer Step #1: 731f380c2ff1: Pulling fs layer Step #1: fd03b6508997: Pulling fs layer Step #1: ff008d189a82: Pulling fs layer Step #1: 29aa799e57e6: Pulling fs layer Step #1: d374a6bee675: Waiting Step #1: ec334fd6e8fa: Waiting Step #1: e3e240b0cd50: Waiting Step #1: 5e1d39d83edd: Waiting Step #1: ae08d37ab679: Pulling fs layer Step #1: 35fa612f5131: Pulling fs layer Step #1: b2512e0eab51: Waiting Step #1: 96c98dcd7e17: Waiting Step #1: 11c964e3f593: Pulling fs layer Step #1: 4e7bf651b6b4: Pulling fs layer Step #1: 4223d1ba77d3: Waiting Step #1: efddb1001a19: Waiting Step #1: 7b105a7ee1bc: Pulling fs layer Step #1: 136e28fc29c9: Waiting Step #1: 729758dd3f83: Pulling fs layer Step #1: 8d45a907f5ae: Waiting Step #1: f2e49f1ff49e: Waiting Step #1: af65c42a8b64: Waiting Step #1: c744ce97d41c: Pulling fs layer Step #1: 44ae4f1bee4d: Waiting Step #1: dc3782209f77: Pulling fs layer Step #1: a144ab822a62: Waiting Step #1: 2f0cc467e898: Waiting Step #1: 98d63d9f6c98: Waiting Step #1: bcbe3735701b: Waiting Step #1: b1b7efa61c06: Waiting Step #1: ae08d37ab679: Waiting Step #1: 64c91e3d268f: Waiting Step #1: 11c964e3f593: Waiting Step #1: 29aa799e57e6: Waiting Step #1: 35fa612f5131: Waiting Step #1: 4e7bf651b6b4: Waiting Step #1: 731f380c2ff1: Waiting Step #1: 18e56a74fe3b: Waiting Step #1: ff008d189a82: Waiting Step #1: 7b105a7ee1bc: Waiting Step #1: dc3782209f77: Waiting Step #1: 3f7b104caa94: Verifying Checksum Step #1: 3f7b104caa94: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 18e56a74fe3b: Download complete Step #1: 98d63d9f6c98: Verifying Checksum Step #1: 98d63d9f6c98: Download complete Step #1: d374a6bee675: Verifying Checksum Step #1: d374a6bee675: Download complete Step #1: e3e240b0cd50: Verifying Checksum Step #1: e3e240b0cd50: Download complete Step #1: f39d80ca7021: Verifying Checksum Step #1: f39d80ca7021: Download complete Step #1: b2512e0eab51: Download complete Step #1: b549f31133a9: Pull complete Step #1: 8d45a907f5ae: Verifying Checksum Step #1: 8d45a907f5ae: Download complete Step #1: 44ae4f1bee4d: Verifying Checksum Step #1: 44ae4f1bee4d: Download complete Step #1: 5e1d39d83edd: Verifying Checksum Step #1: 5e1d39d83edd: Download complete Step #1: 96c98dcd7e17: Verifying Checksum Step #1: 96c98dcd7e17: Download complete Step #1: 136e28fc29c9: Verifying Checksum Step #1: 136e28fc29c9: Download complete Step #1: 4223d1ba77d3: Verifying Checksum Step #1: 4223d1ba77d3: Download complete Step #1: af65c42a8b64: Download complete Step #1: bcbe3735701b: Verifying Checksum Step #1: bcbe3735701b: Download complete Step #1: a144ab822a62: Verifying Checksum Step #1: a144ab822a62: Download complete Step #1: efddb1001a19: Verifying Checksum Step #1: efddb1001a19: Download complete Step #1: f2e49f1ff49e: Verifying Checksum Step #1: f2e49f1ff49e: Download complete Step #1: 2f0cc467e898: Verifying Checksum Step #1: 2f0cc467e898: Download complete Step #1: b1b7efa61c06: Verifying Checksum Step #1: b1b7efa61c06: Download complete Step #1: 731f380c2ff1: Verifying Checksum Step #1: 731f380c2ff1: Download complete Step #1: 64c91e3d268f: Verifying Checksum Step #1: 64c91e3d268f: Download complete Step #1: fd03b6508997: Verifying Checksum Step #1: fd03b6508997: Download complete Step #1: ff008d189a82: Verifying Checksum Step #1: ff008d189a82: Download complete Step #1: 29aa799e57e6: Verifying Checksum Step #1: 29aa799e57e6: Download complete Step #1: ec334fd6e8fa: Verifying Checksum Step #1: ec334fd6e8fa: Download complete Step #1: ae08d37ab679: Verifying Checksum Step #1: ae08d37ab679: Download complete Step #1: 35fa612f5131: Verifying Checksum Step #1: 35fa612f5131: Download complete Step #1: 4e7bf651b6b4: Verifying Checksum Step #1: 4e7bf651b6b4: Download complete Step #1: 11c964e3f593: Verifying Checksum Step #1: 11c964e3f593: Download complete Step #1: 7b105a7ee1bc: Verifying Checksum Step #1: 7b105a7ee1bc: Download complete Step #1: 729758dd3f83: Verifying Checksum Step #1: 729758dd3f83: Download complete Step #1: f39d80ca7021: Pull complete Step #1: c744ce97d41c: Verifying Checksum Step #1: c744ce97d41c: Download complete Step #1: 3f7b104caa94: Pull complete Step #1: dc3782209f77: Download complete Step #1: 98d63d9f6c98: Pull complete Step #1: 18e56a74fe3b: Pull complete Step #1: d374a6bee675: Pull complete Step #1: ec334fd6e8fa: Pull complete Step #1: e3e240b0cd50: Pull complete Step #1: b2512e0eab51: Pull complete Step #1: 4223d1ba77d3: Pull complete Step #1: 8d45a907f5ae: Pull complete Step #1: 44ae4f1bee4d: Pull complete Step #1: 5e1d39d83edd: Pull complete Step #1: 96c98dcd7e17: Pull complete Step #1: 136e28fc29c9: Pull complete Step #1: af65c42a8b64: Pull complete Step #1: a144ab822a62: Pull complete Step #1: bcbe3735701b: Pull complete Step #1: efddb1001a19: Pull complete Step #1: f2e49f1ff49e: Pull complete Step #1: 2f0cc467e898: Pull complete Step #1: b1b7efa61c06: Pull complete Step #1: 64c91e3d268f: Pull complete Step #1: 731f380c2ff1: Pull complete Step #1: fd03b6508997: Pull complete Step #1: ff008d189a82: Pull complete Step #1: 29aa799e57e6: Pull complete Step #1: ae08d37ab679: Pull complete Step #1: 35fa612f5131: Pull complete Step #1: 11c964e3f593: Pull complete Step #1: 4e7bf651b6b4: Pull complete Step #1: 7b105a7ee1bc: Pull complete Step #1: 729758dd3f83: Pull complete Step #1: c744ce97d41c: Pull complete Step #1: dc3782209f77: Pull complete Step #1: Digest: sha256:21d065e1b72764f938247c38a47698ffc7ac4c9dcbd3eb150532a4e7c9ac2af7 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> ef4502e291df Step #1: Step 2/4 : RUN git clone https://github.com/rthalley/dnspython dnspython Step #1: ---> Running in b65be7a8f5a3 Step #1: Cloning into 'dnspython'... Step #1: Removing intermediate container b65be7a8f5a3 Step #1: ---> e43fecbeaa94 Step #1: Step 3/4 : COPY *.sh *py $SRC/ Step #1: ---> 38d70529e4ce Step #1: Step 4/4 : WORKDIR $SRC/dnspython Step #1: ---> Running in f8546f049ba7 Step #1: Removing intermediate container f8546f049ba7 Step #1: ---> dd3e4018fa40 Step #1: Successfully built dd3e4018fa40 Step #1: Successfully tagged gcr.io/oss-fuzz/dnspython:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/dnspython Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileIjNXSO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/dnspython/.git Step #2 - "srcmap": + GIT_DIR=/src/dnspython Step #2 - "srcmap": + cd /src/dnspython Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/rthalley/dnspython Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a2b81a2edf4da1b8f052e573e93e3067b5bb7d11 Step #2 - "srcmap": + jq_inplace /tmp/fileIjNXSO '."/src/dnspython" = { type: "git", url: "https://github.com/rthalley/dnspython", rev: "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filegRNYxc Step #2 - "srcmap": + cat /tmp/fileIjNXSO Step #2 - "srcmap": + jq '."/src/dnspython" = { type: "git", url: "https://github.com/rthalley/dnspython", rev: "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" }' Step #2 - "srcmap": + mv /tmp/filegRNYxc /tmp/fileIjNXSO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileIjNXSO Step #2 - "srcmap": + rm /tmp/fileIjNXSO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/dnspython": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/rthalley/dnspython", Step #2 - "srcmap": "rev": "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + pip3 install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/dnspython Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / - done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25hBuilding wheels for collected packages: dnspython Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for dnspython (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for dnspython: filename=dnspython-2.8.0.dev0-py3-none-any.whl size=315871 sha256=a560314443350e41a19fbc41613b4e109aaf14e9f57817fbe50fec3e14a6d1e9 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-de318367/wheels/0c/3c/fb/fe1eeefd46b0bac7985dc31f7ce987776f60bfb6d5dec0fd86 Step #3 - "compile-libfuzzer-address-x86_64": Successfully built dnspython Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: dnspython Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed dnspython-2.8.0.dev0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_token --onefile --name fuzz_token.pkg /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": 86 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #3 - "compile-libfuzzer-address-x86_64": 86 INFO: Python: 3.10.14 Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: wrote /src/dnspython/fuzz_token.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 90 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python310.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src'] Step #3 - "compile-libfuzzer-address-x86_64": 182 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 182 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 182 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 182 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 182 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 183 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 193 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 653 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 726 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1919 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3161 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3255 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3265 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3265 INFO: Analyzing /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": 3267 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3402 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 3411 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 3413 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 3417 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 3419 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 3424 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 3872 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/warn-fuzz_token.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 3885 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/xref-fuzz_token.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 3896 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 3897 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 3897 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 4065 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 4078 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 4078 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4078 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14525 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 14527 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 14527 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 14527 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 14527 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 14527 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14528 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 14607 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_token.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_message --onefile --name fuzz_message.pkg /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": 85 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #3 - "compile-libfuzzer-address-x86_64": 85 INFO: Python: 3.10.14 Step #3 - "compile-libfuzzer-address-x86_64": 87 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 87 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 87 INFO: wrote /src/dnspython/fuzz_message.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 89 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python310.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src'] Step #3 - "compile-libfuzzer-address-x86_64": 183 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 184 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 184 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 184 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 184 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 185 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 194 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 703 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 771 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2016 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3256 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3349 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3358 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3359 INFO: Analyzing /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": 3361 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3560 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 3855 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 4010 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 4012 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 4016 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 4018 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 4024 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 4484 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/warn-fuzz_message.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 4501 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/xref-fuzz_message.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 4515 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 4515 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4515 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 4710 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 4724 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 4724 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4724 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 15166 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": 15168 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 15243 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_message.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_message Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": f39d80ca7021: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 3f7b104caa94: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": fb13a18b8d24: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1e6f70e73fed: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c8c19f1a206d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0bccc74b0cc0: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": fc73d508fba8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 076d4d0c30b1: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1763470f3f22: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 88fe58210e04: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a2d0fdcf2123: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 13a1399396a7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0f69f8b7d97d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 46813ec47842: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6860115fd42a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5256a36340c7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 465e42175aa3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 70d46b3445a4: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2cf450df525b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e491ffded19a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0b512f445b6d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e9a0aa9dd6dc: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f235e0212358: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0cdaacbae252: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 36c8153c465a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a2d0fdcf2123: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 46813ec47842: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 88fe58210e04: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6860115fd42a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0bccc74b0cc0: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": fc73d508fba8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 13a1399396a7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 076d4d0c30b1: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2cf450df525b: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0f69f8b7d97d: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 70d46b3445a4: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 465e42175aa3: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e9a0aa9dd6dc: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e491ffded19a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f235e0212358: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0cdaacbae252: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 36c8153c465a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c8c19f1a206d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fb13a18b8d24: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fb13a18b8d24: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e6f70e73fed: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1e6f70e73fed: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fc73d508fba8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": fc73d508fba8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0bccc74b0cc0: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0bccc74b0cc0: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fb13a18b8d24: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1763470f3f22: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1763470f3f22: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 88fe58210e04: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": a2d0fdcf2123: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a2d0fdcf2123: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1e6f70e73fed: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c8c19f1a206d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f69f8b7d97d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0f69f8b7d97d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 46813ec47842: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 46813ec47842: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0bccc74b0cc0: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 076d4d0c30b1: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 076d4d0c30b1: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": fc73d508fba8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6860115fd42a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6860115fd42a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 13a1399396a7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 13a1399396a7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 465e42175aa3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 465e42175aa3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2cf450df525b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2cf450df525b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5256a36340c7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5256a36340c7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e491ffded19a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0b512f445b6d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0b512f445b6d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e9a0aa9dd6dc: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e9a0aa9dd6dc: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f235e0212358: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f235e0212358: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 36c8153c465a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 36c8153c465a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0cdaacbae252: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 076d4d0c30b1: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 70d46b3445a4: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 70d46b3445a4: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1763470f3f22: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 88fe58210e04: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a2d0fdcf2123: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 13a1399396a7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f69f8b7d97d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 46813ec47842: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6860115fd42a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5256a36340c7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 465e42175aa3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 70d46b3445a4: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2cf450df525b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e491ffded19a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0b512f445b6d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e9a0aa9dd6dc: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f235e0212358: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0cdaacbae252: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 36c8153c465a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:8a72aa1d5aca33da78cb3d3358c751907a98e497b6fc228853bb1a3867714c50 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwx0tmzkk/fuzz_token Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpwx0tmzkk/fuzz_message Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/dnspython Step #6: adding: fuzz_message (deflated 32%) Step #6: adding: fuzz_message.pkg (deflated 1%) Step #6: adding: fuzz_token (deflated 32%) Step #6: adding: fuzz_token.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 72%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 0062f774e994: Waiting Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 155 0 0 100 155 0 749 --:--:-- --:--:-- --:--:-- 752 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 54.9M 0 0 100 54.9M 0 93.5M --:--:-- --:--:-- --:--:-- 93.6M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 24 0 0 100 24 0 97 --:--:-- --:--:-- --:--:-- 97 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 34 0 0 100 34 0 151 --:--:-- --:--:-- --:--:-- 151 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/dnspython Finished Step #11 Starting Step #12 - "compile-libfuzzer-undefined-x86_64" Step #12 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #12 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #12 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function -fno-sanitize=function,leak,vptr, Step #12 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #12 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": + pip3 install . Step #12 - "compile-libfuzzer-undefined-x86_64": Processing /src/dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Installing build dependencies ... [?25l- \ | / - done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25hBuilding wheels for collected packages: dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Building wheel for dnspython (pyproject.toml) ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Created wheel for dnspython: filename=dnspython-2.8.0.dev0-py3-none-any.whl size=315871 sha256=a560314443350e41a19fbc41613b4e109aaf14e9f57817fbe50fec3e14a6d1e9 Step #12 - "compile-libfuzzer-undefined-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-qnz9c8qt/wheels/0c/3c/fb/fe1eeefd46b0bac7985dc31f7ce987776f60bfb6d5dec0fd86 Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully built dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Installing collected packages: dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully installed dnspython-2.8.0.dev0 Step #12 - "compile-libfuzzer-undefined-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #12 - "compile-libfuzzer-undefined-x86_64": ++ find /src -name 'fuzz_*.py' Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1 Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_token --onefile --name fuzz_token.pkg /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: Python: 3.10.14 Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: Python environment: /usr/local Step #12 - "compile-libfuzzer-undefined-x86_64": 88 INFO: wrote /src/dnspython/fuzz_token.pkg.spec Step #12 - "compile-libfuzzer-undefined-x86_64": 90 INFO: Module search paths (PYTHONPATH): Step #12 - "compile-libfuzzer-undefined-x86_64": ['/usr/local/lib/python310.zip', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #12 - "compile-libfuzzer-undefined-x86_64": '/src'] Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: checking Analysis Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Building Analysis because Analysis-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Running Analysis Analysis-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Target bytecode optimization level: 0 Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Initializing module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Caching module graph hooks... Step #12 - "compile-libfuzzer-undefined-x86_64": 194 INFO: Analyzing base_library.zip ... Step #12 - "compile-libfuzzer-undefined-x86_64": 535 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 904 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 1964 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3214 INFO: Caching module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 3309 INFO: Looking for Python shared library... Step #12 - "compile-libfuzzer-undefined-x86_64": 3319 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 3320 INFO: Analyzing /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": 3322 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #12 - "compile-libfuzzer-undefined-x86_64": 3452 INFO: Processing module hooks (post-graph stage)... Step #12 - "compile-libfuzzer-undefined-x86_64": 3461 INFO: Performing binary vs. data reclassification (2 entries) Step #12 - "compile-libfuzzer-undefined-x86_64": 3464 INFO: Looking for ctypes DLLs Step #12 - "compile-libfuzzer-undefined-x86_64": 3467 INFO: Analyzing run-time hooks ... Step #12 - "compile-libfuzzer-undefined-x86_64": 3468 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3474 INFO: Looking for dynamic libraries Step #12 - "compile-libfuzzer-undefined-x86_64": 3931 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/warn-fuzz_token.pkg.txt Step #12 - "compile-libfuzzer-undefined-x86_64": 3944 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/xref-fuzz_token.pkg.html Step #12 - "compile-libfuzzer-undefined-x86_64": 3955 INFO: checking PYZ Step #12 - "compile-libfuzzer-undefined-x86_64": 3955 INFO: Building PYZ because PYZ-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 3955 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz Step #12 - "compile-libfuzzer-undefined-x86_64": 4124 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 4137 INFO: checking PKG Step #12 - "compile-libfuzzer-undefined-x86_64": 4137 INFO: Building PKG because PKG-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4137 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 14581 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 14582 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #12 - "compile-libfuzzer-undefined-x86_64": 14582 INFO: checking EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 14583 INFO: Building EXE because EXE-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 14583 INFO: Building EXE from EXE-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 14583 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 14583 INFO: Appending PKG archive to custom ELF section in EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 14660 INFO: Building EXE from EXE-00.toc completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0") Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_token.pkg $@' Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1 Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_message --onefile --name fuzz_message.pkg /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: Python: 3.10.14 Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: Python environment: /usr/local Step #12 - "compile-libfuzzer-undefined-x86_64": 88 INFO: wrote /src/dnspython/fuzz_message.pkg.spec Step #12 - "compile-libfuzzer-undefined-x86_64": 90 INFO: Module search paths (PYTHONPATH): Step #12 - "compile-libfuzzer-undefined-x86_64": ['/usr/local/lib/python310.zip', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #12 - "compile-libfuzzer-undefined-x86_64": '/src'] Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: checking Analysis Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Building Analysis because Analysis-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Running Analysis Analysis-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Target bytecode optimization level: 0 Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Initializing module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 185 INFO: Caching module graph hooks... Step #12 - "compile-libfuzzer-undefined-x86_64": 194 INFO: Analyzing base_library.zip ... Step #12 - "compile-libfuzzer-undefined-x86_64": 551 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 864 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 2002 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3258 INFO: Caching module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 3352 INFO: Looking for Python shared library... Step #12 - "compile-libfuzzer-undefined-x86_64": 3362 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 3362 INFO: Analyzing /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": 3364 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #12 - "compile-libfuzzer-undefined-x86_64": 3556 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3857 INFO: Processing module hooks (post-graph stage)... Step #12 - "compile-libfuzzer-undefined-x86_64": 4015 INFO: Performing binary vs. data reclassification (2 entries) Step #12 - "compile-libfuzzer-undefined-x86_64": 4018 INFO: Looking for ctypes DLLs Step #12 - "compile-libfuzzer-undefined-x86_64": 4021 INFO: Analyzing run-time hooks ... Step #12 - "compile-libfuzzer-undefined-x86_64": 4024 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 4031 INFO: Looking for dynamic libraries Step #12 - "compile-libfuzzer-undefined-x86_64": 4487 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/warn-fuzz_message.pkg.txt Step #12 - "compile-libfuzzer-undefined-x86_64": 4506 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/xref-fuzz_message.pkg.html Step #12 - "compile-libfuzzer-undefined-x86_64": 4519 INFO: checking PYZ Step #12 - "compile-libfuzzer-undefined-x86_64": 4519 INFO: Building PYZ because PYZ-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4519 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz Step #12 - "compile-libfuzzer-undefined-x86_64": 4726 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 4740 INFO: checking PKG Step #12 - "compile-libfuzzer-undefined-x86_64": 4740 INFO: Building PKG because PKG-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4741 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 15186 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 15187 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #12 - "compile-libfuzzer-undefined-x86_64": 15187 INFO: checking EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 15187 INFO: Building EXE because EXE-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 15188 INFO: Building EXE from EXE-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 15188 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 15188 INFO: Appending PKG archive to custom ELF section in EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 15239 INFO: Building EXE from EXE-00.toc completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0") Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_message.pkg $@' Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_message Finished Step #12 - "compile-libfuzzer-undefined-x86_64" Starting Step #13 - "build-check-libfuzzer-undefined-x86_64" Step #13 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpryosd7_h/fuzz_token Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpryosd7_h/fuzz_message Finished Step #13 - "build-check-libfuzzer-undefined-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/dnspython Step #15: adding: fuzz_message (deflated 32%) Step #15: adding: fuzz_message.pkg (deflated 1%) Step #15: adding: fuzz_token (deflated 32%) Step #15: adding: fuzz_token.pkg (deflated 1%) Step #15: adding: llvm-symbolizer (deflated 66%) Step #15: adding: sanitizer_with_fuzzer.so (deflated 70%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 155 0 0 100 155 0 759 --:--:-- --:--:-- --:--:-- 759 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 81 52.4M 0 0 81 42.9M 0 188M --:--:-- --:--:-- --:--:-- 188M 100 52.4M 0 0 100 52.4M 0 85.4M --:--:-- --:--:-- --:--:-- 85.4M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 24 0 0 100 24 0 80 --:--:-- --:--:-- --:--:-- 80 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 36 0 0 100 36 0 180 --:--:-- --:--:-- --:--:-- 180 100 36 0 0 100 36 0 180 --:--:-- --:--:-- --:--:-- 180 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/dnspython Finished Step #20 PUSH DONE