starting build "fb53d2e7-7230-44d1-8318-5e6c99e566ca" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809" Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Sending build context to Docker daemon 5.12kB Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder-python Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": latest: Pulling from oss-fuzz-base/base-builder-python Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b549f31133a9: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ef3c76f7df30: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 9f8f643d8006: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b64057a12e1c: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 662006bb0807: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 4b503ca9d9bc: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f1a29e744437: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a2a22f967804: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": e72648080e63: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 945b5a62f111: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a33fbe52522f: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": cb8adac1e4ac: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6ce5e7ad829b: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 78b3cc2fa6e6: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 197024c931b9: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 940045afa063: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 1a3163cb01c1: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 7ea3debb8cbd: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2b97e04a97b5: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f8a36e1c021e: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 3c9abd7d8840: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f92ce4f9f90d: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a8835054d016: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b685c4d35c3a: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dac9741d43d2: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dc9f433701a6: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 44fc7f7b3c67: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 67a3febf6e4c: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 981575c1df4c: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 98a640299daa: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2820a6581e2a: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 82f096e556a3: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6b6d59cb5bb8: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b172b1ba4696: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6a11c270d7cc: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": d9b527ce6e49: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2869f64c54c1: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 8d2570283fa5: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": af1ac80962a7: Pulling fs layer Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f92ce4f9f90d: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 945b5a62f111: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a8835054d016: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a33fbe52522f: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b685c4d35c3a: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": cb8adac1e4ac: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dac9741d43d2: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dc9f433701a6: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6ce5e7ad829b: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 44fc7f7b3c67: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 78b3cc2fa6e6: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 67a3febf6e4c: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a2a22f967804: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 981575c1df4c: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 197024c931b9: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 98a640299daa: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f8a36e1c021e: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 940045afa063: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2820a6581e2a: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 82f096e556a3: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 3c9abd7d8840: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6b6d59cb5bb8: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 8d2570283fa5: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 1a3163cb01c1: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b172b1ba4696: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": af1ac80962a7: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2b97e04a97b5: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6a11c270d7cc: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 7ea3debb8cbd: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": d9b527ce6e49: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f1a29e744437: Waiting Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 9f8f643d8006: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 662006bb0807: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f1a29e744437: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a2a22f967804: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a2a22f967804: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b549f31133a9: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b549f31133a9: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b64057a12e1c: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b64057a12e1c: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a33fbe52522f: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a33fbe52522f: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": cb8adac1e4ac: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": cb8adac1e4ac: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 78b3cc2fa6e6: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 78b3cc2fa6e6: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6ce5e7ad829b: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6ce5e7ad829b: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ef3c76f7df30: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ef3c76f7df30: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 940045afa063: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 940045afa063: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 197024c931b9: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 197024c931b9: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 945b5a62f111: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 945b5a62f111: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 7ea3debb8cbd: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 7ea3debb8cbd: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 1a3163cb01c1: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 1a3163cb01c1: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2b97e04a97b5: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f8a36e1c021e: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f8a36e1c021e: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 3c9abd7d8840: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 3c9abd7d8840: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f92ce4f9f90d: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f92ce4f9f90d: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b549f31133a9: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a8835054d016: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a8835054d016: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b685c4d35c3a: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b685c4d35c3a: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dac9741d43d2: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dac9741d43d2: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dc9f433701a6: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 44fc7f7b3c67: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 981575c1df4c: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 981575c1df4c: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 67a3febf6e4c: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 67a3febf6e4c: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2820a6581e2a: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2820a6581e2a: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 82f096e556a3: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 82f096e556a3: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": e72648080e63: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": e72648080e63: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6b6d59cb5bb8: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6b6d59cb5bb8: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 98a640299daa: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 98a640299daa: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6a11c270d7cc: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b172b1ba4696: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": d9b527ce6e49: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": d9b527ce6e49: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2869f64c54c1: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2869f64c54c1: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 8d2570283fa5: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 8d2570283fa5: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": af1ac80962a7: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": af1ac80962a7: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 4b503ca9d9bc: Verifying Checksum Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 4b503ca9d9bc: Download complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ef3c76f7df30: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 9f8f643d8006: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b64057a12e1c: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 662006bb0807: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 4b503ca9d9bc: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f1a29e744437: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a2a22f967804: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": e72648080e63: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 945b5a62f111: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a33fbe52522f: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": cb8adac1e4ac: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6ce5e7ad829b: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 78b3cc2fa6e6: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 197024c931b9: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 940045afa063: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 1a3163cb01c1: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 7ea3debb8cbd: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2b97e04a97b5: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f8a36e1c021e: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 3c9abd7d8840: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": f92ce4f9f90d: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": a8835054d016: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b685c4d35c3a: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dac9741d43d2: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": dc9f433701a6: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 44fc7f7b3c67: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 67a3febf6e4c: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 981575c1df4c: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 98a640299daa: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2820a6581e2a: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 82f096e556a3: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6b6d59cb5bb8: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": b172b1ba4696: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 6a11c270d7cc: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": d9b527ce6e49: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 2869f64c54c1: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 8d2570283fa5: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": af1ac80962a7: Pull complete Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Digest: sha256:c49376192165513efbe1a16464895386f67777d1e36761ec1f4ec3e4f53ed813 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder-python:latest Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> be7c07a468cb Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Step 2/5 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> Running in 6b336adc8c67 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease [128 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Fetched 383 kB in 1s (380 kB/s) Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Reading package lists... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Reading package lists... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Building dependency tree... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Reading state information... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": make is already the newest version (4.2.1-1.2). Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": make set to manually installed. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": The following additional packages will be installed: Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": file libltdl-dev libltdl7 libmagic-mgc libmagic1 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Suggested packages: Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": | fortran95-compiler gcj-jdk Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": The following NEW packages will be installed: Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": autoconf automake file libltdl-dev libltdl7 libmagic-mgc libmagic1 libtool Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": 0 upgraded, 8 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Need to get 1522 kB of archives. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": After this operation, 12.3 MB of additional disk space will be used. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Fetched 1522 kB in 1s (1346 kB/s) Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package libmagic-mgc. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../0-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking libmagic-mgc (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package libmagic1:amd64. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../1-libmagic1_1%3a5.38-4_amd64.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package file. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../2-file_1%3a5.38-4_amd64.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking file (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package autoconf. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../3-autoconf_2.69-11.1_all.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking autoconf (2.69-11.1) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package automake. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../4-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package libltdl7:amd64. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../5-libltdl7_2.4.6-14_amd64.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package libltdl-dev:amd64. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../6-libltdl-dev_2.4.6-14_amd64.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Selecting previously unselected package libtool. Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Preparing to unpack .../7-libtool_2.4.6-14_all.deb ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Unpacking libtool (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up libmagic-mgc (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up libmagic1:amd64 (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up file (1:5.38-4) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up libltdl7:amd64 (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up autoconf (2.69-11.1) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up automake (1:1.16.1-4ubuntu6) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up libtool (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Removing intermediate container 6b336adc8c67 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> 5fae404119d5 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Step 3/5 : RUN git clone --depth 1 https://github.com/sigstore/model-transparency Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> Running in 28da8a8cd878 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Cloning into 'model-transparency'... Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Removing intermediate container 28da8a8cd878 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> 2e0907c7481b Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Step 4/5 : WORKDIR model-transparency Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> Running in 36ddd5f59d25 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Removing intermediate container 36ddd5f59d25 Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> c89c2f86c1fd Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Step 5/5 : COPY build.sh $SRC/ Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": ---> fcdb3ce94c8d Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Successfully built fcdb3ce94c8d Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Successfully tagged gcr.io/oss-fuzz/model-transparency:latest Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/model-transparency:latest Finished Step #1 - "build-dacfa8e5-1b01-4f7a-ac1d-c1d324375809" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/model-transparency Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/file9KjaAP Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ python == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/model-transparency/.git Step #2 - "srcmap": + GIT_DIR=/src/model-transparency Step #2 - "srcmap": + cd /src/model-transparency Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/sigstore/model-transparency Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=992a56ba2c4f84727729498e5dbd2c16ad5b0d7c Step #2 - "srcmap": + jq_inplace /tmp/file9KjaAP '."/src/model-transparency" = { type: "git", url: "https://github.com/sigstore/model-transparency", rev: "992a56ba2c4f84727729498e5dbd2c16ad5b0d7c" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filer5ZDQa Step #2 - "srcmap": + cat /tmp/file9KjaAP Step #2 - "srcmap": + jq '."/src/model-transparency" = { type: "git", url: "https://github.com/sigstore/model-transparency", rev: "992a56ba2c4f84727729498e5dbd2c16ad5b0d7c" }' Step #2 - "srcmap": + mv /tmp/filer5ZDQa /tmp/file9KjaAP Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/file9KjaAP Step #2 - "srcmap": + rm /tmp/file9KjaAP Step #2 - "srcmap": { Step #2 - "srcmap": "/src/model-transparency": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/sigstore/model-transparency", Step #2 - "srcmap": "rev": "992a56ba2c4f84727729498e5dbd2c16ad5b0d7c" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-address-x86_64" Step #3 - "compile-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-address-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": CC=clang Step #3 - "compile-libfuzzer-address-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-address-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -fno-sanitize=function,leak,vptr, Step #3 - "compile-libfuzzer-address-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=unknown-warning-option -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fsanitize=address -fsanitize-address-use-after-scope -fsanitize=fuzzer-no-link -stdlib=libc++ -fno-sanitize=function,leak,vptr Step #3 - "compile-libfuzzer-address-x86_64": RUSTFLAGS=--cfg fuzzing -Zsanitizer=address -Cdebuginfo=1 -Cforce-frame-pointers Step #3 - "compile-libfuzzer-address-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-address-x86_64": + python3 -m pip install . Step #3 - "compile-libfuzzer-address-x86_64": Processing /src/model-transparency Step #3 - "compile-libfuzzer-address-x86_64": Installing build dependencies ... [?25l- \ | / done Step #3 - "compile-libfuzzer-address-x86_64": [?25h Getting requirements to build wheel ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Preparing metadata (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25hCollecting asn1crypto (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading asn1crypto-1.5.1-py2.py3-none-any.whl.metadata (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting blake3 (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading blake3-1.0.8-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (4.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting click (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading click-8.3.1-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting cryptography (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cryptography-46.0.3-cp311-abi3-manylinux_2_28_x86_64.whl.metadata (5.7 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting in-toto-attestation (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading in_toto_attestation-0.9.3-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore-models>=0.0.5 (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_models-0.0.5-py3-none-any.whl.metadata (1.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore>=4.0 (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore-4.1.0-py3-none-any.whl.metadata (16 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting typing-extensions (from model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_extensions-4.15.0-py3-none-any.whl.metadata (3.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting id>=1.1.0 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading id-1.5.0-py3-none-any.whl.metadata (5.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyasn1~=0.6 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyasn1-0.6.1-py3-none-any.whl.metadata (8.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pydantic<3,>=2 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic-2.12.4-py3-none-any.whl.metadata (89 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyjwt>=2.1 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading PyJWT-2.10.1-py3-none-any.whl.metadata (4.0 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pyOpenSSL>=23.0.0 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyopenssl-25.3.0-py3-none-any.whl.metadata (17 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting requests (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading requests-2.32.5-py3-none-any.whl.metadata (4.9 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rich<15,>=13 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rich-14.2.0-py3-none-any.whl.metadata (18 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rfc8785~=0.1.2 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rfc8785-0.1.4-py3-none-any.whl.metadata (3.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting rfc3161-client<1.1.0,>=1.0.3 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rfc3161_client-1.0.5-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (5.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting sigstore-rekor-types==0.0.18 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_rekor_types-0.0.18-py3-none-any.whl.metadata (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting tuf~=6.0 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading tuf-6.0.0-py3-none-any.whl.metadata (8.1 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting platformdirs~=4.2 (from sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading platformdirs-4.5.0-py3-none-any.whl.metadata (12 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting cffi>=2.0.0 (from cryptography->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cffi-2.0.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting annotated-types>=0.6.0 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading annotated_types-0.7.0-py3-none-any.whl.metadata (15 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pydantic-core==2.41.5 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic_core-2.41.5-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl.metadata (7.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting typing-inspection>=0.4.2 (from pydantic<3,>=2->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_inspection-0.4.2-py3-none-any.whl.metadata (2.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting email-validator>=2.0.0 (from pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading email_validator-2.3.0-py3-none-any.whl.metadata (26 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting markdown-it-py>=2.2.0 (from rich<15,>=13->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading markdown_it_py-4.0.0-py3-none-any.whl.metadata (7.3 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pygments<3.0.0,>=2.13.0 (from rich<15,>=13->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pygments-2.19.2-py3-none-any.whl.metadata (2.5 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting securesystemslib~=1.0 (from tuf~=6.0->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading securesystemslib-1.3.1-py3-none-any.whl.metadata (4.8 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting urllib3<3,>=1.21.1 (from tuf~=6.0->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading urllib3-2.5.0-py3-none-any.whl.metadata (6.5 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting pycparser (from cffi>=2.0.0->cryptography->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pycparser-2.23-py3-none-any.whl.metadata (993 bytes) Step #3 - "compile-libfuzzer-address-x86_64": Collecting dnspython>=2.0.0 (from email-validator>=2.0.0->pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading dnspython-2.8.0-py3-none-any.whl.metadata (5.7 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting idna>=2.0.0 (from email-validator>=2.0.0->pydantic[email]<3,>=2->sigstore-rekor-types==0.0.18->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.11-py3-none-any.whl.metadata (8.4 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting mdurl~=0.1 (from markdown-it-py>=2.2.0->rich<15,>=13->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading mdurl-0.1.2-py3-none-any.whl.metadata (1.6 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting protobuf (from in-toto-attestation->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading protobuf-6.33.1-cp39-abi3-manylinux2014_x86_64.whl.metadata (593 bytes) Step #3 - "compile-libfuzzer-address-x86_64": Collecting charset_normalizer<4,>=2 (from requests->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading charset_normalizer-3.4.4-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl.metadata (37 kB) Step #3 - "compile-libfuzzer-address-x86_64": Collecting certifi>=2017.4.17 (from requests->sigstore>=4.0->model-signing==1.1.1) Step #3 - "compile-libfuzzer-address-x86_64": Downloading certifi-2025.11.12-py3-none-any.whl.metadata (2.5 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore-4.1.0-py3-none-any.whl (109 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_models-0.0.5-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading sigstore_rekor_types-0.0.18-py3-none-any.whl (20 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cryptography-46.0.3-cp311-abi3-manylinux_2_28_x86_64.whl (4.5 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/4.5 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 4.5/4.5 MB 81.1 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading platformdirs-4.5.0-py3-none-any.whl (18 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyasn1-0.6.1-py3-none-any.whl (83 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic-2.12.4-py3-none-any.whl (463 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pydantic_core-2.41.5-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.1 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/2.1 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 2.1/2.1 MB 104.5 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading rfc3161_client-1.0.5-cp39-abi3-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (2.1 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/2.1 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 2.1/2.1 MB 106.6 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading rfc8785-0.1.4-py3-none-any.whl (9.2 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading rich-14.2.0-py3-none-any.whl (243 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pygments-2.19.2-py3-none-any.whl (1.2 MB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/1.2 MB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 1.2/1.2 MB 78.7 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading tuf-6.0.0-py3-none-any.whl (54 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading securesystemslib-1.3.1-py3-none-any.whl (871 kB) Step #3 - "compile-libfuzzer-address-x86_64": [?25l ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 0.0/871.4 kB ? eta -:--:--  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 871.4/871.4 kB 56.7 MB/s 0:00:00 Step #3 - "compile-libfuzzer-address-x86_64": [?25hDownloading urllib3-2.5.0-py3-none-any.whl (129 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading annotated_types-0.7.0-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading cffi-2.0.0-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.whl (215 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading email_validator-2.3.0-py3-none-any.whl (35 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading dnspython-2.8.0-py3-none-any.whl (331 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading id-1.5.0-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading idna-3.11-py3-none-any.whl (71 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading markdown_it_py-4.0.0-py3-none-any.whl (87 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading mdurl-0.1.2-py3-none-any.whl (10.0 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading PyJWT-2.10.1-py3-none-any.whl (22 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pyopenssl-25.3.0-py3-none-any.whl (57 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_extensions-4.15.0-py3-none-any.whl (44 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading typing_inspection-0.4.2-py3-none-any.whl (14 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading asn1crypto-1.5.1-py2.py3-none-any.whl (105 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading blake3-1.0.8-cp311-cp311-manylinux_2_17_x86_64.manylinux2014_x86_64.whl (387 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading click-8.3.1-py3-none-any.whl (108 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading in_toto_attestation-0.9.3-py3-none-any.whl (13 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading protobuf-6.33.1-cp39-abi3-manylinux2014_x86_64.whl (323 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading pycparser-2.23-py3-none-any.whl (118 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading requests-2.32.5-py3-none-any.whl (64 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading charset_normalizer-3.4.4-cp311-cp311-manylinux2014_x86_64.manylinux_2_17_x86_64.manylinux_2_28_x86_64.whl (151 kB) Step #3 - "compile-libfuzzer-address-x86_64": Downloading certifi-2025.11.12-py3-none-any.whl (159 kB) Step #3 - "compile-libfuzzer-address-x86_64": Building wheels for collected packages: model-signing Step #3 - "compile-libfuzzer-address-x86_64": Building wheel for model-signing (pyproject.toml) ... [?25ldone Step #3 - "compile-libfuzzer-address-x86_64": [?25h Created wheel for model-signing: filename=model_signing-1.1.1-py3-none-any.whl size=73299 sha256=ff708335a43595d83f871df3007c4ede53772d301435aead5cc88a00a2a7f563 Step #3 - "compile-libfuzzer-address-x86_64": Stored in directory: /root/.cache/pip/wheels/a1/02/87/8b89f995b84ccdbf992ed9ce50d5f8daca7ee55f7f347ab63b Step #3 - "compile-libfuzzer-address-x86_64": Successfully built model-signing Step #3 - "compile-libfuzzer-address-x86_64": Installing collected packages: asn1crypto, urllib3, typing-extensions, securesystemslib, rfc8785, pyjwt, pygments, pycparser, pyasn1, protobuf, platformdirs, mdurl, idna, dnspython, click, charset_normalizer, certifi, annotated-types, typing-inspection, tuf, requests, pydantic-core, markdown-it-py, in-toto-attestation, email-validator, cffi, blake3, rich, pydantic, id, cryptography, sigstore-models, rfc3161-client, pyOpenSSL, sigstore-rekor-types, sigstore, model-signing Step #3 - "compile-libfuzzer-address-x86_64": [?25l  ━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  2/37 [typing-extensions]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  6/37 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  6/37 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  6/37 [pygments]  ━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  6/37 [pygments]  ━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  7/37 [pycparser]  ━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━  9/37 [protobuf]  ━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━ 13/37 [dnspython]  ━━━━━━━━━━━━━━╺━━━━━━━━━━━━━━━━━━━━━━━━━ 13/37 [dnspython]  ━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━━━━ 19/37 [tuf]  ━━━━━━━━━━━━━━━━━━━━━━━╸━━━━━━━━━━━━━━━━ 22/37 [markdown-it-py]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━━ 27/37 [rich]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━ 28/37 [pydantic]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━━━ 28/37 [pydantic]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╺━━━━━━━ 30/37 [cryptography]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╸━━━━ 33/37 [pyOpenSSL]  ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ 37/37 [model-signing] Step #3 - "compile-libfuzzer-address-x86_64": [?25h Successfully installed annotated-types-0.7.0 asn1crypto-1.5.1 blake3-1.0.8 certifi-2025.11.12 cffi-2.0.0 charset_normalizer-3.4.4 click-8.3.1 cryptography-46.0.3 dnspython-2.8.0 email-validator-2.3.0 id-1.5.0 idna-3.11 in-toto-attestation-0.9.3 markdown-it-py-4.0.0 mdurl-0.1.2 model-signing-1.1.1 platformdirs-4.5.0 protobuf-6.33.1 pyOpenSSL-25.3.0 pyasn1-0.6.1 pycparser-2.23 pydantic-2.12.4 pydantic-core-2.41.5 pygments-2.19.2 pyjwt-2.10.1 requests-2.32.5 rfc3161-client-1.0.5 rfc8785-0.1.4 rich-14.2.0 securesystemslib-1.3.1 sigstore-4.1.0 sigstore-models-0.0.5 sigstore-rekor-types-0.0.18 tuf-6.0.0 typing-extensions-4.15.0 typing-inspection-0.4.2 urllib3-2.5.0 Step #3 - "compile-libfuzzer-address-x86_64": WARNING: Running pip as the 'root' user can result in broken permissions and conflicting behaviour with the system package manager, possibly rendering your system unusable. It is recommended to use a virtual environment instead: https://pip.pypa.io/warnings/venv. Use the --root-user-action option if you know what you are doing and want to suppress this warning. Step #3 - "compile-libfuzzer-address-x86_64": ++ find /src/model-transparency/tests/fuzzing -name 'fuzz_*.py' Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_with_invalid_key --onefile --name fuzz_sign_with_invalid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: wrote /src/model-transparency/fuzz_sign_with_invalid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 77 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 173 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 793 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1056 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1474 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2691 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 2770 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 2780 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 2780 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 2783 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 2845 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 3271 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 3447 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 3447 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 7290 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 7430 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8044 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 8306 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 8605 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9157 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10442 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10812 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 11708 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13427 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13877 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14089 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14089 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 14094 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14100 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14100 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 14265 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14316 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14445 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14446 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14447 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14447 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 14456 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14456 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 14464 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14464 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 14558 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14558 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 14565 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14565 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 14639 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14750 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14750 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 14792 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14792 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 14861 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14861 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 14952 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14952 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 15438 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15617 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15623 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15684 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15684 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 16594 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 16996 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16996 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 17128 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17128 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 19903 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 19908 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 19945 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 20010 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 20017 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20019 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20020 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20022 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20022 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20026 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20047 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 20705 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/warn-fuzz_sign_with_invalid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 20778 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/xref-fuzz_sign_with_invalid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 20807 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 20807 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 20807 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 21988 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_invalid_key/fuzz_sign_with_invalid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 22019 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 22019 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 22019 INFO: Building PKG (CArchive) fuzz_sign_with_invalid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 37751 INFO: Building PKG (CArchive) fuzz_sign_with_invalid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 37754 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 37755 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 37755 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 37755 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 37755 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 37755 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 37887 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_with_invalid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_simple_sigstore.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_simple_sigstore.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_simple_sigstore.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_simple_sigstore Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_simple_sigstore.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_simple_sigstore Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_simple_sigstore Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_simple_sigstore --onefile --name fuzz_simple_sigstore.pkg /src/model-transparency/tests/fuzzing/fuzz_simple_sigstore.py Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: wrote /src/model-transparency/fuzz_simple_sigstore.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 163 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 171 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 885 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 955 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2251 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3631 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3713 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3722 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3722 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_simple_sigstore.py Step #3 - "compile-libfuzzer-address-x86_64": 3728 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3815 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4246 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4570 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4796 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4797 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8408 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8570 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9202 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9720 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11040 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11405 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12343 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13459 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13920 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14150 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14262 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14262 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 14267 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14274 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14274 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 14434 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14487 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14598 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14598 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14600 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14600 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 14608 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14608 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 14615 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14615 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 14732 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14732 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 14738 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14738 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 14813 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14922 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14922 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 14941 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14941 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 15013 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15014 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 15138 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15138 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 15585 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15764 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15771 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15830 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15830 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 17460 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 17792 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17792 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 17897 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17897 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 20454 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 20458 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 20493 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 20559 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 20567 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20569 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20570 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20572 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20573 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20577 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20603 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 21273 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_simple_sigstore/fuzz_simple_sigstore.pkg/warn-fuzz_simple_sigstore.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 21347 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_simple_sigstore/fuzz_simple_sigstore.pkg/xref-fuzz_simple_sigstore.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 21378 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 21378 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 21378 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_simple_sigstore/fuzz_simple_sigstore.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 22541 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_simple_sigstore/fuzz_simple_sigstore.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 22571 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 22571 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 22571 INFO: Building PKG (CArchive) fuzz_simple_sigstore.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 37915 INFO: Building PKG (CArchive) fuzz_simple_sigstore.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_simple_sigstore.pkg Step #3 - "compile-libfuzzer-address-x86_64": 37919 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 38045 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_simple_sigstore.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_simple_sigstore.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_simple_sigstore.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_simple_sigstore Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_verify_with_valid_key --onefile --name fuzz_sign_verify_with_valid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 68 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 68 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: wrote /src/model-transparency/fuzz_sign_verify_with_valid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 156 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 156 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 156 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 156 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 157 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 157 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 628 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1011 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 1415 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3752 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3834 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3843 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3843 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 3848 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3909 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4335 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4505 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4505 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8009 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8144 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8773 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9026 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9325 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9839 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11166 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11522 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12508 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14183 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14666 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14861 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14862 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 14866 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 14874 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 14874 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 15038 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15088 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15221 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15222 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15223 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15223 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 15232 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15232 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 15240 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15240 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 15331 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15331 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 15339 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15339 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 15421 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15575 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15575 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 15597 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15597 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 15669 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15669 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 15765 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15765 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 16288 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 16475 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16482 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16545 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16545 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 17544 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 17944 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17944 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 18031 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18031 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 20863 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 20868 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 20902 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 20969 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 20977 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20979 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20980 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20982 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20983 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 20986 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21014 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 21688 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/warn-fuzz_sign_verify_with_valid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 21801 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/xref-fuzz_sign_verify_with_valid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 21831 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 21831 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 21831 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 22986 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_verify_with_valid_key/fuzz_sign_verify_with_valid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 23016 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 23016 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23016 INFO: Building PKG (CArchive) fuzz_sign_verify_with_valid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 38715 INFO: Building PKG (CArchive) fuzz_sign_verify_with_valid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 38718 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 38718 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 38718 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 38718 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 38718 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 38719 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 38853 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_verify_with_valid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_with_cert_chain --onefile --name fuzz_with_cert_chain.pkg /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": 69 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 70 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 71 INFO: wrote /src/model-transparency/fuzz_with_cert_chain.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 159 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 167 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 912 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2268 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3781 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 4085 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4167 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 4176 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 4176 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_with_cert_chain.py Step #3 - "compile-libfuzzer-address-x86_64": 4187 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 4252 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4692 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 5029 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 5029 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8819 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8986 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9583 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9724 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 10074 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10649 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12001 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12371 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13263 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15053 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15493 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15708 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15708 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 15712 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15719 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15720 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 15879 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15930 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 16038 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16038 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 16040 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16040 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 16049 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16049 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 16082 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16082 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 16165 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16165 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 16173 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16173 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 16246 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16355 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16355 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 16397 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16397 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 16464 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16464 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 16553 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16553 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 17066 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 17251 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17258 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17319 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17319 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 18249 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 18614 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18614 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 18699 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18699 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 21465 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 21470 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 21506 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 21573 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 21581 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21583 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21584 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21586 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21587 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21591 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21619 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 22290 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/warn-fuzz_with_cert_chain.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 22364 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/xref-fuzz_with_cert_chain.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 22393 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 22393 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 22393 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 23564 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_with_cert_chain/fuzz_with_cert_chain.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 23593 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 23594 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23594 INFO: Building PKG (CArchive) fuzz_with_cert_chain.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 39307 INFO: Building PKG (CArchive) fuzz_with_cert_chain.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 39311 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 39311 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 39311 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 39311 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 39311 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": 39312 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 39442 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_with_cert_chain.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_with_cert_chain.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_with_cert_chain Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_then_mutate_verify_with_valid_key --onefile --name fuzz_sign_then_mutate_verify_with_valid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 72 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: wrote /src/model-transparency/fuzz_sign_then_mutate_verify_with_valid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 161 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 161 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 161 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 162 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 162 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 162 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 171 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 821 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 896 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2523 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 4026 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 4107 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 4116 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 4116 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_then_mutate_verify_with_valid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 4122 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 4182 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4612 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4785 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4785 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8626 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8761 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 9363 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9618 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9950 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10469 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11816 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 12179 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 13049 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14836 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15301 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15514 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15514 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 15519 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15525 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15525 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 15684 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15735 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15871 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15871 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15873 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15873 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 15882 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15882 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 15890 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15890 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 15974 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15975 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 15982 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15982 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 16056 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16210 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16210 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 16231 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16231 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 16302 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16302 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 16397 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16397 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 16924 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 17109 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17116 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 17181 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 17182 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 18128 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 18504 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18505 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 18612 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18613 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 21283 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 21288 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 21323 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 21390 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 21399 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21400 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21402 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21403 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21404 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21407 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21431 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 22099 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/warn-fuzz_sign_then_mutate_verify_with_valid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 22171 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/xref-fuzz_sign_then_mutate_verify_with_valid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 22200 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 22200 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 22200 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 23370 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_then_mutate_verify_with_valid_key/fuzz_sign_then_mutate_verify_with_valid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 23399 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 23399 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23399 INFO: Building PKG (CArchive) fuzz_sign_then_mutate_verify_with_valid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 39065 INFO: Building PKG (CArchive) fuzz_sign_then_mutate_verify_with_valid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 39069 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 39069 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 39069 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 39069 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 39070 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 39070 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 39198 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_then_mutate_verify_with_valid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_then_mutate_verify_with_valid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_then_mutate_verify_with_valid_key Step #3 - "compile-libfuzzer-address-x86_64": + for fuzzer in $(find $SRC/model-transparency/tests/fuzzing -name 'fuzz_*.py') Step #3 - "compile-libfuzzer-address-x86_64": + compile_python_fuzzer /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_path=/src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + shift 1 Step #3 - "compile-libfuzzer-address-x86_64": ++ basename -s .py /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_basename=fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + fuzzer_package=fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + PYFUZZ_WORKPATH=/src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + FUZZ_WORKPATH=/src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *introspector* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + [[ 0 != \0 ]] Step #3 - "compile-libfuzzer-address-x86_64": + rm -rf /src/pyfuzzworkdir/ Step #3 - "compile-libfuzzer-address-x86_64": + mkdir /src/pyfuzzworkdir/ /src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + pyinstaller --distpath /workspace/out/libfuzzer-address-x86_64 --workpath=/src/pyfuzzworkdir//fuzz_sign_with_valid_key_verify_with_invalid_key --onefile --name fuzz_sign_with_valid_key_verify_with_invalid_key.pkg /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 73 INFO: PyInstaller: 6.10.0, contrib hooks: 2025.9 Step #3 - "compile-libfuzzer-address-x86_64": 74 INFO: Python: 3.11.13 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Platform: Linux-5.10.0-32-cloud-amd64-x86_64-with-glibc2.31 Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: Python environment: /usr/local Step #3 - "compile-libfuzzer-address-x86_64": 75 INFO: wrote /src/model-transparency/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.spec Step #3 - "compile-libfuzzer-address-x86_64": 77 INFO: Module search paths (PYTHONPATH): Step #3 - "compile-libfuzzer-address-x86_64": ['/usr/local/lib/python311.zip', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/lib-dynload', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages', Step #3 - "compile-libfuzzer-address-x86_64": '/usr/local/lib/python3.11/site-packages/setuptools/_vendor', Step #3 - "compile-libfuzzer-address-x86_64": '/src/model-transparency/tests/fuzzing'] Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: checking Analysis Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Building Analysis because Analysis-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Running Analysis Analysis-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 164 INFO: Target bytecode optimization level: 0 Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Initializing module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 165 INFO: Caching module graph hooks... Step #3 - "compile-libfuzzer-address-x86_64": 173 INFO: Analyzing base_library.zip ... Step #3 - "compile-libfuzzer-address-x86_64": 778 INFO: Processing standard module hook 'hook-heapq.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 851 INFO: Processing standard module hook 'hook-encodings.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 2387 INFO: Processing standard module hook 'hook-pickle.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 3674 INFO: Caching module dependency graph... Step #3 - "compile-libfuzzer-address-x86_64": 3745 INFO: Looking for Python shared library... Step #3 - "compile-libfuzzer-address-x86_64": 3754 INFO: Using Python shared library: /usr/local/lib/libpython3.11.so.1.0 Step #3 - "compile-libfuzzer-address-x86_64": 3754 INFO: Analyzing /src/model-transparency/tests/fuzzing/fuzz_sign_with_valid_key_verify_with_invalid_key.py Step #3 - "compile-libfuzzer-address-x86_64": 3759 INFO: Processing standard module hook 'hook-atheris.py' from '/usr/local/lib/python3.11/site-packages/atheris' Step #3 - "compile-libfuzzer-address-x86_64": 3818 INFO: Processing standard module hook 'hook-cryptography.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 4251 INFO: hook-cryptography: cryptography does not seem to be using dynamically linked OpenSSL. Step #3 - "compile-libfuzzer-address-x86_64": 4445 INFO: Processing pre-safe-import-module hook 'hook-typing_extensions.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 4445 INFO: SetuptoolsInfo: initializing cached setuptools info... Step #3 - "compile-libfuzzer-address-x86_64": 8120 INFO: Processing standard module hook 'hook-multiprocessing.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8312 INFO: Processing standard module hook 'hook-xml.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 8924 INFO: Processing standard module hook 'hook-certifi.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9181 INFO: Processing standard module hook 'hook-pydantic.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 9502 INFO: Processing standard module hook 'hook-platform.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 10020 INFO: Processing standard module hook 'hook-pygments.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11368 INFO: Processing standard module hook 'hook-sysconfig.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 11720 INFO: Processing standard module hook 'hook-zoneinfo.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 12697 INFO: Processing standard module hook 'hook-dns.rdata.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14468 INFO: Processing standard module hook 'hook-urllib3.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 14893 INFO: Processing standard module hook 'hook-charset_normalizer.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15115 INFO: Processing pre-safe-import-module hook 'hook-importlib_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15115 INFO: Setuptools: 'importlib_resources' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_resources'! Step #3 - "compile-libfuzzer-address-x86_64": 15121 INFO: Processing standard module hook 'hook-setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15129 INFO: Processing pre-safe-import-module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15129 INFO: Processing pre-find-module-path hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_find_module_path' Step #3 - "compile-libfuzzer-address-x86_64": 15290 INFO: Processing standard module hook 'hook-distutils.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15346 INFO: Processing standard module hook 'hook-distutils.util.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15463 INFO: Processing pre-safe-import-module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15464 INFO: Processing standard module hook 'hook-packaging.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 15465 INFO: Processing pre-safe-import-module hook 'hook-jaraco.text.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15465 INFO: Setuptools: 'jaraco.text' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.text'! Step #3 - "compile-libfuzzer-address-x86_64": 15475 INFO: Processing pre-safe-import-module hook 'hook-jaraco.functools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15475 INFO: Setuptools: 'jaraco.functools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.functools'! Step #3 - "compile-libfuzzer-address-x86_64": 15483 INFO: Processing pre-safe-import-module hook 'hook-more_itertools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15483 INFO: Setuptools: 'more_itertools' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.more_itertools'! Step #3 - "compile-libfuzzer-address-x86_64": 15626 INFO: Processing pre-safe-import-module hook 'hook-jaraco.context.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15627 INFO: Setuptools: 'jaraco.context' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.jaraco.context'! Step #3 - "compile-libfuzzer-address-x86_64": 15634 INFO: Processing pre-safe-import-module hook 'hook-backports.tarfile.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15634 INFO: Setuptools: 'backports.tarfile' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.backports.tarfile'! Step #3 - "compile-libfuzzer-address-x86_64": 15711 INFO: Processing standard module hook 'hook-backports.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 15829 INFO: Processing pre-safe-import-module hook 'hook-importlib_metadata.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15829 INFO: Setuptools: 'importlib_metadata' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.importlib_metadata'! Step #3 - "compile-libfuzzer-address-x86_64": 15849 INFO: Processing pre-safe-import-module hook 'hook-zipp.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15849 INFO: Setuptools: 'zipp' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.zipp'! Step #3 - "compile-libfuzzer-address-x86_64": 15957 INFO: Processing pre-safe-import-module hook 'hook-ordered_set.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 15957 INFO: Setuptools: 'ordered_set' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.ordered_set'! Step #3 - "compile-libfuzzer-address-x86_64": 16054 INFO: Processing pre-safe-import-module hook 'hook-tomli.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16054 INFO: Setuptools: 'tomli' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.tomli'! Step #3 - "compile-libfuzzer-address-x86_64": 16564 INFO: Processing standard module hook 'hook-pkg_resources.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks' Step #3 - "compile-libfuzzer-address-x86_64": 16749 INFO: Processing pre-safe-import-module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16756 INFO: Processing standard module hook 'hook-platformdirs.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/stdhooks' Step #3 - "compile-libfuzzer-address-x86_64": 16868 INFO: Processing pre-safe-import-module hook 'hook-wheel.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 16868 INFO: Setuptools: 'wheel' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.wheel'! Step #3 - "compile-libfuzzer-address-x86_64": 17860 INFO: Processing module hooks (post-graph stage)... Step #3 - "compile-libfuzzer-address-x86_64": 18253 INFO: Processing pre-safe-import-module hook 'hook-autocommand.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18253 INFO: Setuptools: 'autocommand' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.autocommand'! Step #3 - "compile-libfuzzer-address-x86_64": 18345 INFO: Processing pre-safe-import-module hook 'hook-typeguard.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/pre_safe_import_module' Step #3 - "compile-libfuzzer-address-x86_64": 18345 INFO: Setuptools: 'typeguard' appears to be a setuptools-vendored copy - creating alias to 'setuptools._vendor.typeguard'! Step #3 - "compile-libfuzzer-address-x86_64": 21040 INFO: Performing binary vs. data reclassification (121 entries) Step #3 - "compile-libfuzzer-address-x86_64": 21045 INFO: Looking for ctypes DLLs Step #3 - "compile-libfuzzer-address-x86_64": 21080 WARNING: Library Iphlpapi.dll required via ctypes not found Step #3 - "compile-libfuzzer-address-x86_64": 21149 INFO: Analyzing run-time hooks ... Step #3 - "compile-libfuzzer-address-x86_64": 21158 INFO: Including run-time hook 'pyi_rth_inspect.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21159 INFO: Including run-time hook 'pyi_rth_pkgutil.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21161 INFO: Including run-time hook 'pyi_rth_multiprocessing.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21162 INFO: Including run-time hook 'pyi_rth_setuptools.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21163 INFO: Including run-time hook 'pyi_rth_pkgres.py' from '/usr/local/lib/python3.11/site-packages/PyInstaller/hooks/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21167 INFO: Including run-time hook 'pyi_rth_cryptography_openssl.py' from '/usr/local/lib/python3.11/site-packages/_pyinstaller_hooks_contrib/rthooks' Step #3 - "compile-libfuzzer-address-x86_64": 21194 INFO: Looking for dynamic libraries Step #3 - "compile-libfuzzer-address-x86_64": 21868 INFO: Warnings written to /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/warn-fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.txt Step #3 - "compile-libfuzzer-address-x86_64": 21941 INFO: Graph cross-reference written to /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/xref-fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.html Step #3 - "compile-libfuzzer-address-x86_64": 21971 INFO: checking PYZ Step #3 - "compile-libfuzzer-address-x86_64": 21971 INFO: Building PYZ because PYZ-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 21971 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/PYZ-00.pyz Step #3 - "compile-libfuzzer-address-x86_64": 23126 INFO: Building PYZ (ZlibArchive) /src/pyfuzzworkdir/fuzz_sign_with_valid_key_verify_with_invalid_key/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg/PYZ-00.pyz completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 23156 INFO: checking PKG Step #3 - "compile-libfuzzer-address-x86_64": 23156 INFO: Building PKG because PKG-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 23156 INFO: Building PKG (CArchive) fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.pkg Step #3 - "compile-libfuzzer-address-x86_64": 38835 INFO: Building PKG (CArchive) fuzz_sign_with_valid_key_verify_with_invalid_key.pkg.pkg completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": 38838 INFO: Bootloader /usr/local/lib/python3.11/site-packages/PyInstaller/bootloader/Linux-64bit-intel/run Step #3 - "compile-libfuzzer-address-x86_64": 38838 INFO: checking EXE Step #3 - "compile-libfuzzer-address-x86_64": 38838 INFO: Building EXE because EXE-00.toc is non existent Step #3 - "compile-libfuzzer-address-x86_64": 38839 INFO: Building EXE from EXE-00.toc Step #3 - "compile-libfuzzer-address-x86_64": 38839 INFO: Copying bootloader EXE to /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": 38839 INFO: Appending PKG archive to custom ELF section in EXE Step #3 - "compile-libfuzzer-address-x86_64": 38966 INFO: Building EXE from EXE-00.toc completed successfully. Step #3 - "compile-libfuzzer-address-x86_64": + chmod -x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": + [[ address = *coverage* ]] Step #3 - "compile-libfuzzer-address-x86_64": + echo '#!/bin/sh Step #3 - "compile-libfuzzer-address-x86_64": # LLVMFuzzerTestOneInput for fuzzer detection. Step #3 - "compile-libfuzzer-address-x86_64": this_dir=$(dirname "$0") Step #3 - "compile-libfuzzer-address-x86_64": chmod +x $this_dir/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg Step #3 - "compile-libfuzzer-address-x86_64": LD_PRELOAD=$this_dir/sanitizer_with_fuzzer.so ASAN_OPTIONS=$ASAN_OPTIONS:symbolize=1:external_symbolizer_path=$this_dir/llvm-symbolizer:detect_leaks=0 $this_dir/fuzz_sign_with_valid_key_verify_with_invalid_key.pkg $@' Step #3 - "compile-libfuzzer-address-x86_64": + chmod +x /workspace/out/libfuzzer-address-x86_64/fuzz_sign_with_valid_key_verify_with_invalid_key Step #3 - "compile-libfuzzer-address-x86_64": + cp /src/model-transparency/tests/fuzzing/dicts/fuzz_simple_sigstore.dict /workspace/out/libfuzzer-address-x86_64/ Finished Step #3 - "compile-libfuzzer-address-x86_64" Starting Step #4 - "build-check-libfuzzer-address-x86_64" Step #4 - "build-check-libfuzzer-address-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #4 - "build-check-libfuzzer-address-x86_64": Unable to find image 'gcr.io/oss-fuzz-base/base-runner:latest' locally Step #4 - "build-check-libfuzzer-address-x86_64": latest: Pulling from oss-fuzz-base/base-runner Step #4 - "build-check-libfuzzer-address-x86_64": b549f31133a9: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": ef3c76f7df30: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 9f8f643d8006: Already exists Step #4 - "build-check-libfuzzer-address-x86_64": 0f48af65b814: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 633a0e05339d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 3177fed33998: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2e478429a198: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4f862654912a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 4d5ecc5a85a3: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 861dbe526d45: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f0d22c3bd001: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c7365ba546a7: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 81305a35774f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 084b00e4fd2a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 2571f26ef59d: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": f3ad3c26378e: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 23630c9e3597: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 686f4cb8643a: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": e9cb1af2d3fd: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 485022339309: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": bacda3c2d798: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c57fafada48f: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 68403e1b2d67: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": 6456ed930b42: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c1d227e471d8: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c4fc3ca540a9: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": d64a40b43ad5: Pulling fs layer Step #4 - "build-check-libfuzzer-address-x86_64": c7365ba546a7: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 81305a35774f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 084b00e4fd2a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 2571f26ef59d: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f3ad3c26378e: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 23630c9e3597: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 686f4cb8643a: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 861dbe526d45: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": e9cb1af2d3fd: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 485022339309: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": bacda3c2d798: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": f0d22c3bd001: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c57fafada48f: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": d64a40b43ad5: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 6456ed930b42: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c1d227e471d8: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": c4fc3ca540a9: Waiting Step #4 - "build-check-libfuzzer-address-x86_64": 4f862654912a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4f862654912a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3177fed33998: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f48af65b814: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 0f48af65b814: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 633a0e05339d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 633a0e05339d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 861dbe526d45: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 861dbe526d45: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2e478429a198: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2e478429a198: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": f0d22c3bd001: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f0d22c3bd001: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c7365ba546a7: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c7365ba546a7: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 0f48af65b814: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f3ad3c26378e: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": f3ad3c26378e: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2571f26ef59d: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 2571f26ef59d: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 084b00e4fd2a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 686f4cb8643a: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 686f4cb8643a: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 633a0e05339d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 4d5ecc5a85a3: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 4d5ecc5a85a3: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": bacda3c2d798: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": bacda3c2d798: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 485022339309: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 485022339309: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 3177fed33998: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6456ed930b42: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 6456ed930b42: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 81305a35774f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 68403e1b2d67: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 68403e1b2d67: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 2e478429a198: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c4fc3ca540a9: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c4fc3ca540a9: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": d64a40b43ad5: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": d64a40b43ad5: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4f862654912a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c1d227e471d8: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c1d227e471d8: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": c57fafada48f: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": c57fafada48f: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 23630c9e3597: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": 23630c9e3597: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": e9cb1af2d3fd: Verifying Checksum Step #4 - "build-check-libfuzzer-address-x86_64": e9cb1af2d3fd: Download complete Step #4 - "build-check-libfuzzer-address-x86_64": 4d5ecc5a85a3: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 861dbe526d45: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f0d22c3bd001: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c7365ba546a7: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 81305a35774f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 084b00e4fd2a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 2571f26ef59d: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": f3ad3c26378e: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 23630c9e3597: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 686f4cb8643a: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": e9cb1af2d3fd: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 485022339309: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": bacda3c2d798: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c57fafada48f: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 68403e1b2d67: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": 6456ed930b42: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c1d227e471d8: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": c4fc3ca540a9: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": d64a40b43ad5: Pull complete Step #4 - "build-check-libfuzzer-address-x86_64": Digest: sha256:fca20b650077b304d8fda564b4e8e271b7605c6c867f322be5273900ded9d1b8 Step #4 - "build-check-libfuzzer-address-x86_64": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_simple_sigstore Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_sign_with_valid_key_verify_with_invalid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_sign_then_mutate_verify_with_valid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_sign_with_invalid_key Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_with_cert_chain Step #4 - "build-check-libfuzzer-address-x86_64": INFO: performing bad build checks for /tmp/not-out/tmprlp9l3_d/fuzz_sign_verify_with_valid_key Finished Step #4 - "build-check-libfuzzer-address-x86_64" Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Finished Step #5 Starting Step #6 Step #6: Already have image: gcr.io/oss-fuzz/model-transparency Step #6: adding: fuzz_sign_then_mutate_verify_with_valid_key (deflated 38%) Step #6: adding: fuzz_sign_then_mutate_verify_with_valid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_verify_with_valid_key (deflated 36%) Step #6: adding: fuzz_sign_verify_with_valid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_with_invalid_key (deflated 35%) Step #6: adding: fuzz_sign_with_invalid_key.pkg (deflated 1%) Step #6: adding: fuzz_sign_with_valid_key_verify_with_invalid_key (deflated 41%) Step #6: adding: fuzz_sign_with_valid_key_verify_with_invalid_key.pkg (deflated 1%) Step #6: adding: fuzz_simple_sigstore (deflated 34%) Step #6: adding: fuzz_simple_sigstore.dict (deflated 48%) Step #6: adding: fuzz_simple_sigstore.pkg (deflated 1%) Step #6: adding: fuzz_with_cert_chain (deflated 34%) Step #6: adding: fuzz_with_cert_chain.pkg (deflated 1%) Step #6: adding: llvm-symbolizer (deflated 65%) Step #6: adding: sanitizer_with_fuzzer.so (deflated 72%) Finished Step #6 Starting Step #7 Step #7: Pulling image: gcr.io/oss-fuzz-base/uploader Step #7: Using default tag: latest Step #7: latest: Pulling from oss-fuzz-base/uploader Step #7: c62795f78da9: Pulling fs layer Step #7: d4fceeeb758e: Pulling fs layer Step #7: 5c9125a401ae: Pulling fs layer Step #7: 0062f774e994: Pulling fs layer Step #7: 6b33fd031fac: Pulling fs layer Step #7: 7eb39101e508: Pulling fs layer Step #7: 89257482f398: Pulling fs layer Step #7: 89257482f398: Waiting Step #7: 6b33fd031fac: Verifying Checksum Step #7: 6b33fd031fac: Download complete Step #7: d4fceeeb758e: Download complete Step #7: 0062f774e994: Verifying Checksum Step #7: 0062f774e994: Download complete Step #7: 5c9125a401ae: Verifying Checksum Step #7: 5c9125a401ae: Download complete Step #7: 89257482f398: Download complete Step #7: c62795f78da9: Verifying Checksum Step #7: 7eb39101e508: Verifying Checksum Step #7: 7eb39101e508: Download complete Step #7: c62795f78da9: Pull complete Step #7: d4fceeeb758e: Pull complete Step #7: 5c9125a401ae: Pull complete Step #7: 0062f774e994: Pull complete Step #7: 6b33fd031fac: Pull complete Step #7: 7eb39101e508: Pull complete Step #7: 89257482f398: Pull complete Step #7: Digest: sha256:5717ba63d13b5515063e2a6ccad09fb5bf32a86c8e0798a363d81c2be522e411 Step #7: Status: Downloaded newer image for gcr.io/oss-fuzz-base/uploader:latest Step #7: gcr.io/oss-fuzz-base/uploader:latest Step #7: % Total % Received % Xferd Average Speed Time Time Time Current Step #7: Dload Upload Total Spent Left Speed Step #7: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 173 0 0 100 173 0 1034 --:--:-- --:--:-- --:--:-- 1035 Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #8: % Total % Received % Xferd Average Speed Time Time Time Current Step #8: Dload Upload Total Spent Left Speed Step #8: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 27 275M 0 0 27 77.0M 0 140M 0:00:01 --:--:-- 0:00:01 140M 83 275M 0 0 83 229M 0 147M 0:00:01 0:00:01 --:--:-- 147M 100 275M 0 0 100 275M 0 131M 0:00:02 0:00:02 --:--:-- 131M Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/oss-fuzz-base/uploader Step #9: % Total % Received % Xferd Average Speed Time Time Time Current Step #9: Dload Upload Total Spent Left Speed Step #9: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 194 0 0 100 194 0 826 --:--:-- --:--:-- --:--:-- 829 Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/curl Step #10: % Total % Received % Xferd Average Speed Time Time Time Current Step #10: Dload Upload Total Spent Left Speed Step #10: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 43 0 0 100 43 0 200 --:--:-- --:--:-- --:--:-- 202 Finished Step #10 Starting Step #11 Step #11: Already have image: gcr.io/oss-fuzz/model-transparency Finished Step #11 PUSH DONE