starting build "cac9256c-69b5-4bf4-a497-aa731371b494" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 8.192kB Step #1: Step 1/4 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1: latest: Pulling from oss-fuzz-base/base-builder-python Step #1: b549f31133a9: Pulling fs layer Step #1: 050ece366bc7: Pulling fs layer Step #1: 6b2bc735f974: Pulling fs layer Step #1: ed5cf27c11ea: Pulling fs layer Step #1: 0d8d65c6dbfe: Pulling fs layer Step #1: 676ecbc2abd2: Pulling fs layer Step #1: 4227acc65cd2: Pulling fs layer Step #1: 82989eb21212: Pulling fs layer Step #1: b979c3cc0d5c: Pulling fs layer Step #1: 00f3b437d961: Pulling fs layer Step #1: 422caa40cd85: Pulling fs layer Step #1: 28ce63ea02b9: Pulling fs layer Step #1: 4ac1853ff1f9: Pulling fs layer Step #1: c2c48cf3902f: Pulling fs layer Step #1: 42470497244f: Pulling fs layer Step #1: 107b7eba1cd0: Pulling fs layer Step #1: 662caa229f8e: Pulling fs layer Step #1: 79fac1104890: Pulling fs layer Step #1: db62c1b828ea: Pulling fs layer Step #1: 0881d2004444: Pulling fs layer Step #1: 1b9d06c2f3ef: Pulling fs layer Step #1: 9b5dc645fccf: Pulling fs layer Step #1: bd739a256415: Pulling fs layer Step #1: 6be1e0d6f9ee: Pulling fs layer Step #1: 676ecbc2abd2: Waiting Step #1: 2057fea419df: Pulling fs layer Step #1: 502e1d3e2272: Pulling fs layer Step #1: 4227acc65cd2: Waiting Step #1: 16d91b64a1bd: Pulling fs layer Step #1: f56b2fca8b31: Pulling fs layer Step #1: 82989eb21212: Waiting Step #1: 0f02aba6f918: Pulling fs layer Step #1: b979c3cc0d5c: Waiting Step #1: b66a6ca6c096: Pulling fs layer Step #1: 28ce63ea02b9: Waiting Step #1: 00f3b437d961: Waiting Step #1: a4dd8c31da90: Pulling fs layer Step #1: 8f698ecb30ae: Pulling fs layer Step #1: 4ac1853ff1f9: Waiting Step #1: ba9ac258b863: Pulling fs layer Step #1: 0a6a74b30d2c: Pulling fs layer Step #1: c2c48cf3902f: Waiting Step #1: c09d716ba98a: Pulling fs layer Step #1: 42470497244f: Waiting Step #1: 107b7eba1cd0: Waiting Step #1: 422caa40cd85: Waiting Step #1: 662caa229f8e: Waiting Step #1: 8f698ecb30ae: Waiting Step #1: 16d91b64a1bd: Waiting Step #1: c09d716ba98a: Waiting Step #1: 79fac1104890: Waiting Step #1: f56b2fca8b31: Waiting Step #1: db62c1b828ea: Waiting Step #1: 0f02aba6f918: Waiting Step #1: bd739a256415: Waiting Step #1: 0881d2004444: Waiting Step #1: ba9ac258b863: Waiting Step #1: b66a6ca6c096: Waiting Step #1: 0a6a74b30d2c: Waiting Step #1: 1b9d06c2f3ef: Waiting Step #1: a4dd8c31da90: Waiting Step #1: 6be1e0d6f9ee: Waiting Step #1: 2057fea419df: Waiting Step #1: 502e1d3e2272: Waiting Step #1: ed5cf27c11ea: Waiting Step #1: 0d8d65c6dbfe: Waiting Step #1: 9b5dc645fccf: Waiting Step #1: 6b2bc735f974: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 0d8d65c6dbfe: Verifying Checksum Step #1: 0d8d65c6dbfe: Download complete Step #1: ed5cf27c11ea: Verifying Checksum Step #1: ed5cf27c11ea: Download complete Step #1: 676ecbc2abd2: Verifying Checksum Step #1: 676ecbc2abd2: Download complete Step #1: 82989eb21212: Verifying Checksum Step #1: 82989eb21212: Download complete Step #1: 050ece366bc7: Verifying Checksum Step #1: 050ece366bc7: Download complete Step #1: b979c3cc0d5c: Verifying Checksum Step #1: b979c3cc0d5c: Download complete Step #1: b549f31133a9: Pull complete Step #1: 422caa40cd85: Verifying Checksum Step #1: 422caa40cd85: Download complete Step #1: 28ce63ea02b9: Verifying Checksum Step #1: 28ce63ea02b9: Download complete Step #1: 4ac1853ff1f9: Verifying Checksum Step #1: 4ac1853ff1f9: Download complete Step #1: c2c48cf3902f: Verifying Checksum Step #1: c2c48cf3902f: Download complete Step #1: 42470497244f: Verifying Checksum Step #1: 42470497244f: Download complete Step #1: 00f3b437d961: Verifying Checksum Step #1: 00f3b437d961: Download complete Step #1: 107b7eba1cd0: Download complete Step #1: 662caa229f8e: Verifying Checksum Step #1: 662caa229f8e: Download complete Step #1: 79fac1104890: Verifying Checksum Step #1: 79fac1104890: Download complete Step #1: db62c1b828ea: Verifying Checksum Step #1: db62c1b828ea: Download complete Step #1: 0881d2004444: Verifying Checksum Step #1: 0881d2004444: Download complete Step #1: 1b9d06c2f3ef: Verifying Checksum Step #1: 1b9d06c2f3ef: Download complete Step #1: 9b5dc645fccf: Verifying Checksum Step #1: 9b5dc645fccf: Download complete Step #1: 4227acc65cd2: Verifying Checksum Step #1: 4227acc65cd2: Download complete Step #1: bd739a256415: Verifying Checksum Step #1: bd739a256415: Download complete Step #1: 6be1e0d6f9ee: Verifying Checksum Step #1: 6be1e0d6f9ee: Download complete Step #1: 2057fea419df: Download complete Step #1: 502e1d3e2272: Verifying Checksum Step #1: 502e1d3e2272: Download complete Step #1: f56b2fca8b31: Verifying Checksum Step #1: f56b2fca8b31: Download complete Step #1: 0f02aba6f918: Download complete Step #1: a4dd8c31da90: Verifying Checksum Step #1: a4dd8c31da90: Download complete Step #1: b66a6ca6c096: Verifying Checksum Step #1: b66a6ca6c096: Download complete Step #1: 050ece366bc7: Pull complete Step #1: 8f698ecb30ae: Verifying Checksum Step #1: 8f698ecb30ae: Download complete Step #1: 6b2bc735f974: Pull complete Step #1: ba9ac258b863: Verifying Checksum Step #1: ba9ac258b863: Download complete Step #1: 0a6a74b30d2c: Download complete Step #1: 16d91b64a1bd: Verifying Checksum Step #1: 16d91b64a1bd: Download complete Step #1: c09d716ba98a: Verifying Checksum Step #1: c09d716ba98a: Download complete Step #1: ed5cf27c11ea: Pull complete Step #1: 0d8d65c6dbfe: Pull complete Step #1: 676ecbc2abd2: Pull complete Step #1: 4227acc65cd2: Pull complete Step #1: 82989eb21212: Pull complete Step #1: b979c3cc0d5c: Pull complete Step #1: 00f3b437d961: Pull complete Step #1: 422caa40cd85: Pull complete Step #1: 28ce63ea02b9: Pull complete Step #1: 4ac1853ff1f9: Pull complete Step #1: c2c48cf3902f: Pull complete Step #1: 42470497244f: Pull complete Step #1: 107b7eba1cd0: Pull complete Step #1: 662caa229f8e: Pull complete Step #1: 79fac1104890: Pull complete Step #1: db62c1b828ea: Pull complete Step #1: 0881d2004444: Pull complete Step #1: 1b9d06c2f3ef: Pull complete Step #1: 9b5dc645fccf: Pull complete Step #1: bd739a256415: Pull complete Step #1: 6be1e0d6f9ee: Pull complete Step #1: 2057fea419df: Pull complete Step #1: 502e1d3e2272: Pull complete Step #1: 16d91b64a1bd: Pull complete Step #1: f56b2fca8b31: Pull complete Step #1: 0f02aba6f918: Pull complete Step #1: b66a6ca6c096: Pull complete Step #1: a4dd8c31da90: Pull complete Step #1: 8f698ecb30ae: Pull complete Step #1: ba9ac258b863: Pull complete Step #1: 0a6a74b30d2c: Pull complete Step #1: c09d716ba98a: Pull complete Step #1: Digest: sha256:c11caa92183431268e77a691cd35c6a14c06db086878a399cb894a8a2979dc2f Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1: ---> b15e403cf6d9 Step #1: Step 2/4 : RUN git clone https://github.com/rthalley/dnspython dnspython Step #1: ---> Running in 0e029903ba5b Step #1: Cloning into 'dnspython'... Step #1: Removing intermediate container 0e029903ba5b Step #1: ---> 58e394201df3 Step #1: Step 3/4 : COPY *.sh *py $SRC/ Step #1: ---> 665587244ba5 Step #1: Step 4/4 : WORKDIR $SRC/dnspython Step #1: ---> Running in ddcef987a50b Step #1: Removing intermediate container ddcef987a50b Step #1: ---> 391c40aab985 Step #1: Successfully built 391c40aab985 Step #1: Successfully tagged gcr.io/oss-fuzz/dnspython:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/dnspython Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileBcx6FO Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/dnspython/.git Step #2 - "srcmap": + GIT_DIR=/src/dnspython Step #2 - "srcmap": + cd /src/dnspython Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/rthalley/dnspython Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=a2b81a2edf4da1b8f052e573e93e3067b5bb7d11 Step #2 - "srcmap": + jq_inplace /tmp/fileBcx6FO '."/src/dnspython" = { type: "git", url: "https://github.com/rthalley/dnspython", rev: "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileWidITb Step #2 - "srcmap": + cat /tmp/fileBcx6FO Step #2 - "srcmap": + jq '."/src/dnspython" = { type: "git", url: "https://github.com/rthalley/dnspython", rev: "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" }' Step #2 - "srcmap": + mv /tmp/fileWidITb /tmp/fileBcx6FO Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileBcx6FO Step #2 - "srcmap": + rm /tmp/fileBcx6FO Step #2 - "srcmap": { Step #2 - "srcmap": "/src/dnspython": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/rthalley/dnspython", Step #2 - "srcmap": "rev": "a2b81a2edf4da1b8f052e573e93e3067b5bb7d11" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + pip3 install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/dnspython Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / - \ done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25hBuilding wheels for collected packages: dnspython Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for dnspython (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for dnspython: filename=dnspython-2.8.0.dev0-py3-none-any.whl size=315871 sha256=a560314443350e41a19fbc41613b4e109aaf14e9f57817fbe50fec3e14a6d1e9 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-o901nz8i/wheels/0c/3c/fb/fe1eeefd46b0bac7985dc31f7ce987776f60bfb6d5dec0fd86 Step #3 - "compile-libfuzzer-address-x86_64": Successfully built dnspython Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: dnspython Step #3 - "compile-libfuzzer-address-x86_64": Successfully installed dnspython-2.8.0.dev0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_token --onefile --name fuzz_token.pkg /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": 90 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #3 - "compile-libfuzzer-address-x86_64": 90 INFO: Python: 3.10.14 Step #3 - "compile-libfuzzer-address-x86_64": 92 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 92 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 92 INFO: wrote /src/dnspython/fuzz_token.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 94 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python310.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src'] Step #3 - "compile-libfuzzer-address-x86_64": 189 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 189 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 189 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 189 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 189 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 190 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 200 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 726 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 802 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2023 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3371 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3468 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3479 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3479 INFO: Analyzing /src/fuzz_token.py Step #3 - "compile-libfuzzer-address-x86_64": 3481 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3611 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 3619 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 3622 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 3625 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 3627 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 3632 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 4099 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/warn-fuzz_token.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 4112 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/xref-fuzz_token.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 4123 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 4123 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4123 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 4294 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 4306 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 4307 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4307 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14831 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 14833 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 14833 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 14833 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 14833 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 14834 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": 14834 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 14915 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_token.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_token.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_token Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_message Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_message --onefile --name fuzz_message.pkg /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": 86 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #3 - "compile-libfuzzer-address-x86_64": 86 INFO: Python: 3.10.14 Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 88 INFO: wrote /src/dnspython/fuzz_message.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 91 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python310.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src'] Step #3 - "compile-libfuzzer-address-x86_64": 186 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 186 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 187 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 187 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 187 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 187 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 197 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 699 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 773 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1986 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3299 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3393 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3403 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3403 INFO: Analyzing /src/fuzz_message.py Step #3 - "compile-libfuzzer-address-x86_64": 3405 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3602 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 3907 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 4083 INFO: Performing binary vs. data reclassification (2 entries) Step #3 - "compile-libfuzzer-address-x86_64": 4086 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 4088 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 4091 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 4099 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 4572 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/warn-fuzz_message.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 4592 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/xref-fuzz_message.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 4606 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 4606 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4606 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 4809 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 4824 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 4824 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 4824 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 15369 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": 15371 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 15431 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_message.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_message.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_message Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 050ece366bc7: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 6b2bc735f974: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 40333eee4a4a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f97fdb4c324b: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bd82301ec621: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7e76eb87f4ae: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 559af97a410c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1dabec308d56: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f3698b855a2c: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": edec3ff55c1a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 9a3f1b9e1b10: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0af78a806525: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": a79e261349c5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 5c1c48c6132a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1a8175f66cec: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 0dc92b57fea6: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3455fe939adf: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 456b5521e176: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4762b81b4fa8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 30e46aeacbcb: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 1c7e4f0785b9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bc09f7d70b46: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 33df86570711: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4c43a204e4fd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 7e76eb87f4ae: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f329ba0aaf50: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 559af97a410c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1dabec308d56: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1a8175f66cec: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f3698b855a2c: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0dc92b57fea6: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": edec3ff55c1a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": bc09f7d70b46: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 33df86570711: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 9a3f1b9e1b10: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4c43a204e4fd: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f329ba0aaf50: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 0af78a806525: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 3455fe939adf: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": a79e261349c5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 5c1c48c6132a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 456b5521e176: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4762b81b4fa8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 1c7e4f0785b9: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 30e46aeacbcb: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": bd82301ec621: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bd82301ec621: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 40333eee4a4a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 40333eee4a4a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f97fdb4c324b: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f97fdb4c324b: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7e76eb87f4ae: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 7e76eb87f4ae: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 559af97a410c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 559af97a410c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 40333eee4a4a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": edec3ff55c1a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": edec3ff55c1a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f3698b855a2c: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f3698b855a2c: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 9a3f1b9e1b10: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f97fdb4c324b: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a79e261349c5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": a79e261349c5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bd82301ec621: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dabec308d56: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1dabec308d56: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 5c1c48c6132a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 5c1c48c6132a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1a8175f66cec: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1a8175f66cec: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 7e76eb87f4ae: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3455fe939adf: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 559af97a410c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0af78a806525: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0af78a806525: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0dc92b57fea6: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0dc92b57fea6: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4762b81b4fa8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4762b81b4fa8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 30e46aeacbcb: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 30e46aeacbcb: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1c7e4f0785b9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 1c7e4f0785b9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bc09f7d70b46: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bc09f7d70b46: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 33df86570711: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 33df86570711: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 456b5521e176: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 456b5521e176: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c43a204e4fd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4c43a204e4fd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f329ba0aaf50: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 1dabec308d56: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f3698b855a2c: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": edec3ff55c1a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 9a3f1b9e1b10: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0af78a806525: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": a79e261349c5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 5c1c48c6132a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1a8175f66cec: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 0dc92b57fea6: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 3455fe939adf: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 456b5521e176: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4762b81b4fa8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 30e46aeacbcb: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 1c7e4f0785b9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": bc09f7d70b46: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 33df86570711: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4c43a204e4fd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f329ba0aaf50: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:213367b8c458f00193b6fa1cd9ff890c9fcee84e702442feedc72c2d4ad5ba06 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpsvxg0cmq/fuzz_token Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpsvxg0cmq/fuzz_message Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/dnspython Step #6: adding: fuzz_message (deflated 32%) Step #6: adding: fuzz_message.pkg (deflated 1%) Step #6: adding: fuzz_token (deflated 32%) Step #6: adding: fuzz_token.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 66%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 72%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 0062f774e994: Waiting Step #7: 6b33fd031fac: Waiting Step #7: 7eb39101e508: Waiting Step #7: 89257482f398: Waiting Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: d4fceeeb758e: Verifying Checksum Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: 89257482f398: Verifying Checksum Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: c62795f78da9: Download complete Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 155 0 0 100 155 0 756 --:--:-- --:--:-- --:--:-- 756 100 155 0 0 100 155 0 756 --:--:-- --:--:-- --:--:-- 756 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 85 54.9M 0 0 85 46.8M 0 139M --:--:-- --:--:-- --:--:-- 139M 100 54.9M 0 0 100 54.9M 0 83.1M --:--:-- --:--:-- --:--:-- 83.1M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 24 0 0 100 24 0 116 --:--:-- --:--:-- --:--:-- 116 100 24 0 0 100 24 0 91 --:--:-- --:--:-- --:--:-- 91 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: Step #10: ***** NOTICE ***** Step #10: Step #10: Supported `curl` versions can be found in the various images available at Step #10: https://console.cloud.google.com/launcher/details/google/ubuntu1604. Step #10: Step #10: ***** END OF NOTICE ***** Step #10: Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 34 0 0 100 34 0 161 --:--:-- --:--:-- --:--:-- 161 100 34 0 0 100 34 0 133 --:--:-- --:--:-- --:--:-- 133 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/dnspython Finished Step #11 Starting Step #12 - "compile-libfuzzer-undefined-x86_64" Step #12 - "compile-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": vm.mmap_rnd_bits = 28 Step #12 - "compile-libfuzzer-undefined-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": CC=clang Step #12 - "compile-libfuzzer-undefined-x86_64": CXX=clang++ Step #12 - "compile-libfuzzer-undefined-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -fno-sanitize=function -fno-sanitize=function,leak,vptr, Step #12 - "compile-libfuzzer-undefined-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unsigned-integer-overflow,unreachable,vla-bound,vptr -fno-sanitize-recover=array-bounds,bool,builtin,enum,function,integer-divide-by-zero,null,object-size,return,returns-nonnull-attribute,shift,signed-integer-overflow,unreachable,vla-bound,vptr -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #12 - "compile-libfuzzer-undefined-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers Step #12 - "compile-libfuzzer-undefined-x86_64": --------------------------------------------------------------- Step #12 - "compile-libfuzzer-undefined-x86_64": + pip3 install . Step #12 - "compile-libfuzzer-undefined-x86_64": Processing /src/dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Installing build dependencies ... [?25l- \ | / - \ done Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25hBuilding wheels for collected packages: dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Building wheel for dnspython (pyproject.toml) ... [?25ldone Step #12 - "compile-libfuzzer-undefined-x86_64": [?25h Created wheel for dnspython: filename=dnspython-2.8.0.dev0-py3-none-any.whl size=315871 sha256=a560314443350e41a19fbc41613b4e109aaf14e9f57817fbe50fec3e14a6d1e9 Step #12 - "compile-libfuzzer-undefined-x86_64": Stored in directory: /tmp/pip-ephem-wheel-cache-kkir606q/wheels/0c/3c/fb/fe1eeefd46b0bac7985dc31f7ce987776f60bfb6d5dec0fd86 Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully built dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Installing collected packages: dnspython Step #12 - "compile-libfuzzer-undefined-x86_64": Successfully installed dnspython-2.8.0.dev0 Step #12 - "compile-libfuzzer-undefined-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable.It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #12 - "compile-libfuzzer-undefined-x86_64": ++ find /src -name 'fuzz_*.py' Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1 Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_token --onefile --name fuzz_token.pkg /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 87 INFO: Python: 3.10.14 Step #12 - "compile-libfuzzer-undefined-x86_64": 89 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #12 - "compile-libfuzzer-undefined-x86_64": 89 INFO: Python environment: /usr/local Step #12 - "compile-libfuzzer-undefined-x86_64": 89 INFO: wrote /src/dnspython/fuzz_token.pkg.spec Step #12 - "compile-libfuzzer-undefined-x86_64": 91 INFO: Module search paths (PYTHONPATH): Step #12 - "compile-libfuzzer-undefined-x86_64": ['/usr/local/lib/python310.zip', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #12 - "compile-libfuzzer-undefined-x86_64": '/src'] Step #12 - "compile-libfuzzer-undefined-x86_64": 186 INFO: checking Analysis Step #12 - "compile-libfuzzer-undefined-x86_64": 187 INFO: Building Analysis because Analysis-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 187 INFO: Running Analysis Analysis-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 187 INFO: Target bytecode optimization level: 0 Step #12 - "compile-libfuzzer-undefined-x86_64": 187 INFO: Initializing module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 187 INFO: Caching module graph hooks... Step #12 - "compile-libfuzzer-undefined-x86_64": 197 INFO: Analyzing base_library.zip ... Step #12 - "compile-libfuzzer-undefined-x86_64": 682 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 749 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 1992 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3279 INFO: Caching module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 3374 INFO: Looking for Python shared library... Step #12 - "compile-libfuzzer-undefined-x86_64": 3383 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 3384 INFO: Analyzing /src/fuzz_token.py Step #12 - "compile-libfuzzer-undefined-x86_64": 3386 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #12 - "compile-libfuzzer-undefined-x86_64": 3521 INFO: Processing module hooks (post-graph stage)... Step #12 - "compile-libfuzzer-undefined-x86_64": 3530 INFO: Performing binary vs. data reclassification (2 entries) Step #12 - "compile-libfuzzer-undefined-x86_64": 3532 INFO: Looking for ctypes DLLs Step #12 - "compile-libfuzzer-undefined-x86_64": 3535 INFO: Analyzing run-time hooks ... Step #12 - "compile-libfuzzer-undefined-x86_64": 3538 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3543 INFO: Looking for dynamic libraries Step #12 - "compile-libfuzzer-undefined-x86_64": 4015 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/warn-fuzz_token.pkg.txt Step #12 - "compile-libfuzzer-undefined-x86_64": 4028 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/xref-fuzz_token.pkg.html Step #12 - "compile-libfuzzer-undefined-x86_64": 4039 INFO: checking PYZ Step #12 - "compile-libfuzzer-undefined-x86_64": 4039 INFO: Building PYZ because PYZ-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4039 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz Step #12 - "compile-libfuzzer-undefined-x86_64": 4209 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_token/fuzz_token.pkg/PYZ-00.pyz completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 4221 INFO: checking PKG Step #12 - "compile-libfuzzer-undefined-x86_64": 4221 INFO: Building PKG because PKG-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4221 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 14757 INFO: Building PKG (CArchive) fuzz_token.pkg.pkg completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 14758 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #12 - "compile-libfuzzer-undefined-x86_64": 14759 INFO: checking EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 14759 INFO: Building EXE because EXE-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 14759 INFO: Building EXE from EXE-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 14759 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 14759 INFO: Appending PKG archive to custom ELF section in EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 14842 INFO: Building EXE from EXE-00.toc completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0") Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_token.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_token.pkg $@' Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_token Step #12 - "compile-libfuzzer-undefined-x86_64": + for fuzzer in $(find $SRC -name 'fuzz_*.py') Step #12 - "compile-libfuzzer-undefined-x86_64": + compile_python_fuzzer /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_path=/src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + shift 1 Step #12 - "compile-libfuzzer-undefined-x86_64": ++ basename -s .py /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_basename=fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + fuzzer_package=fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *introspector* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ 0 != \0 ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #12 - "compile-libfuzzer-undefined-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_message Step #12 - "compile-libfuzzer-undefined-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-undefined-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_message --onefile --name fuzz_message.pkg /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": 84 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 84 INFO: Python: 3.10.14 Step #12 - "compile-libfuzzer-undefined-x86_64": 85 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: Python environment: /usr/local Step #12 - "compile-libfuzzer-undefined-x86_64": 86 INFO: wrote /src/dnspython/fuzz_message.pkg.spec Step #12 - "compile-libfuzzer-undefined-x86_64": 88 INFO: Module search paths (PYTHONPATH): Step #12 - "compile-libfuzzer-undefined-x86_64": ['/usr/local/lib/python310.zip', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/lib-dynload', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages', Step #12 - "compile-libfuzzer-undefined-x86_64": '/usr/local/lib/python3.10/site-packages/setuptools/_vendor', Step #12 - "compile-libfuzzer-undefined-x86_64": '/src'] Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: checking Analysis Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Building Analysis because Analysis-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Running Analysis Analysis-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Target bytecode optimization level: 0 Step #12 - "compile-libfuzzer-undefined-x86_64": 183 INFO: Initializing module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 184 INFO: Caching module graph hooks... Step #12 - "compile-libfuzzer-undefined-x86_64": 194 INFO: Analyzing base_library.zip ... Step #12 - "compile-libfuzzer-undefined-x86_64": 550 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 765 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 2027 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3309 INFO: Caching module dependency graph... Step #12 - "compile-libfuzzer-undefined-x86_64": 3403 INFO: Looking for Python shared library... Step #12 - "compile-libfuzzer-undefined-x86_64": 3412 INFO: Using Python shared library: /usr/local/lib/libpython3.10.so.1.0 Step #12 - "compile-libfuzzer-undefined-x86_64": 3413 INFO: Analyzing /src/fuzz_message.py Step #12 - "compile-libfuzzer-undefined-x86_64": 3415 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.10/site-packages/atheris' Step #12 - "compile-libfuzzer-undefined-x86_64": 3617 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.10/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 3927 INFO: Processing module hooks (post-graph stage)... Step #12 - "compile-libfuzzer-undefined-x86_64": 4089 INFO: Performing binary vs. data reclassification (2 entries) Step #12 - "compile-libfuzzer-undefined-x86_64": 4092 INFO: Looking for ctypes DLLs Step #12 - "compile-libfuzzer-undefined-x86_64": 4095 INFO: Analyzing run-time hooks ... Step #12 - "compile-libfuzzer-undefined-x86_64": 4097 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.10/site-packages/PyInstaller/hooks/rthooks' Step #12 - "compile-libfuzzer-undefined-x86_64": 4104 INFO: Looking for dynamic libraries Step #12 - "compile-libfuzzer-undefined-x86_64": 4580 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/warn-fuzz_message.pkg.txt Step #12 - "compile-libfuzzer-undefined-x86_64": 4597 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/xref-fuzz_message.pkg.html Step #12 - "compile-libfuzzer-undefined-x86_64": 4610 INFO: checking PYZ Step #12 - "compile-libfuzzer-undefined-x86_64": 4610 INFO: Building PYZ because PYZ-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4610 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz Step #12 - "compile-libfuzzer-undefined-x86_64": 4807 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_message/fuzz_message.pkg/PYZ-00.pyz completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 4822 INFO: checking PKG Step #12 - "compile-libfuzzer-undefined-x86_64": 4822 INFO: Building PKG because PKG-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 4822 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 15339 INFO: Building PKG (CArchive) fuzz_message.pkg.pkg completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": 15341 INFO: Bootloader /usr/local/lib/python3.10/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #12 - "compile-libfuzzer-undefined-x86_64": 15341 INFO: checking EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 15341 INFO: Building EXE because EXE-00.toc is non existent Step #12 - "compile-libfuzzer-undefined-x86_64": 15341 INFO: Building EXE from EXE-00.toc Step #12 - "compile-libfuzzer-undefined-x86_64": 15341 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-undefined-x86_64/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": 15342 INFO: Appending PKG archive to custom ELF section in EXE Step #12 - "compile-libfuzzer-undefined-x86_64": 15401 INFO: Building EXE from EXE-00.toc completed successfully. Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod -x /workspace/out/libfuzzer-undefined-x86_64/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": + [[ undefined = *coverage* ]] Step #12 - "compile-libfuzzer-undefined-x86_64": + echo '#!/bin/sh Step #12 - "compile-libfuzzer-undefined-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #12 - "compile-libfuzzer-undefined-x86_64": this_dir=$(dirname "$0") Step #12 - "compile-libfuzzer-undefined-x86_64": chmod +x $this_dir/fuzz_message.pkg Step #12 - "compile-libfuzzer-undefined-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_message.pkg $@' Step #12 - "compile-libfuzzer-undefined-x86_64": + chmod +x /workspace/out/libfuzzer-undefined-x86_64/fuzz_message Finished Step #12 - "compile-libfuzzer-undefined-x86_64" Starting Step #13 - "build-check-libfuzzer-undefined-x86_64" Step #13 - "build-check-libfuzzer-undefined-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzyme6_93/fuzz_token Step #13 - "build-check-libfuzzer-undefined-x86_64": INFO: performing bad build checks for /tmp/not-out/tmpzyme6_93/fuzz_message Finished Step #13 - "build-check-libfuzzer-undefined-x86_64" Starting Step #14 Step #14: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #14 Starting Step #15 Step #15: Already have image: gcr.io/oss-fuzz/dnspython Step #15: adding: fuzz_message (deflated 32%) Step #15: adding: fuzz_message.pkg (deflated 1%) Step #15: adding: fuzz_token (deflated 32%) Step #15: adding: fuzz_token.pkg (deflated 1%) Step #15: adding: llvm-symbolizer (deflated 66%) Step #15: adding: sanitizer_with_fuzzer.so (deflated 70%) Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #16: % Total % Received % Xferd Average Speed Time Time Time Current Step #16: Dload Upload Total Spent Left Speed Step #16: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 155 0 0 100 155 0 603 --:--:-- --:--:-- --:--:-- 605 Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 52.4M 0 0 100 52.4M 0 92.3M --:--:-- --:--:-- --:--:-- 92.5M Finished Step #17 Starting Step #18 Step #18: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #18: % Total % Received % Xferd Average Speed Time Time Time Current Step #18: Dload Upload Total Spent Left Speed Step #18: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 24 0 0 100 24 0 93 --:--:-- --:--:-- --:--:-- 93 Finished Step #18 Starting Step #19 Step #19: Already have image (with digest): gcr.io/cloud-builders/curl Step #19: % Total % Received % Xferd Average Speed Time Time Time Current Step #19: Dload Upload Total Spent Left Speed Step #19: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 36 0 0 100 36 0 182 --:--:-- --:--:-- --:--:-- 182 Finished Step #19 Starting Step #20 Step #20: Already have image: gcr.io/oss-fuzz/dnspython Finished Step #20 PUSH DONE