starting build "07de5054-f4f3-4dca-bc3c-a7e10e5eda3a" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 Step #1: Already have image (with digest): gcr.io/cloud-builders/docker Step #1: Sending build context to Docker daemon 6.656kB Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder Step #1: latest: Pulling from oss-fuzz-base/base-builder Step #1: b549f31133a9: Pulling fs layer Step #1: 8fbcbf53a4e0: Pulling fs layer Step #1: 0cefac2553f1: Pulling fs layer Step #1: 9497b68c874a: Pulling fs layer Step #1: 2a97cb3dcc4c: Pulling fs layer Step #1: 60b31369ad8f: Pulling fs layer Step #1: 5847d1847d18: Pulling fs layer Step #1: 8f20461fc7c2: Pulling fs layer Step #1: 4d82e0d035cc: Pulling fs layer Step #1: e8dfaee9590c: Pulling fs layer Step #1: c56a664ea751: Pulling fs layer Step #1: 99ec2a426bac: Pulling fs layer Step #1: f1b6a7886e7b: Pulling fs layer Step #1: 03d7d741b0df: Pulling fs layer Step #1: 1c8aca0428a7: Pulling fs layer Step #1: 30d0d3658364: Pulling fs layer Step #1: d2acd632fa33: Pulling fs layer Step #1: 0c2b459f8992: Pulling fs layer Step #1: 084e8d272547: Pulling fs layer Step #1: b674d1fbd06a: Pulling fs layer Step #1: 35903e68556a: Pulling fs layer Step #1: 1d54d6a00b25: Pulling fs layer Step #1: 4b63d9578783: Pulling fs layer Step #1: 5a4ef0ea8421: Pulling fs layer Step #1: b7a169ea6d9f: Pulling fs layer Step #1: 2d86793f2635: Pulling fs layer Step #1: 37a70280ac0f: Pulling fs layer Step #1: 8b82f1a02e1c: Pulling fs layer Step #1: 946352761910: Pulling fs layer Step #1: 9497b68c874a: Waiting Step #1: 723c135ef4a9: Pulling fs layer Step #1: 46f69de9c5f6: Pulling fs layer Step #1: 2a97cb3dcc4c: Waiting Step #1: 5e5e3c162074: Pulling fs layer Step #1: 60b31369ad8f: Waiting Step #1: 5847d1847d18: Waiting Step #1: 946352761910: Waiting Step #1: 8f20461fc7c2: Waiting Step #1: 723c135ef4a9: Waiting Step #1: 4d82e0d035cc: Waiting Step #1: 0c2b459f8992: Waiting Step #1: e8dfaee9590c: Waiting Step #1: 084e8d272547: Waiting Step #1: 5a4ef0ea8421: Waiting Step #1: c56a664ea751: Waiting Step #1: b674d1fbd06a: Waiting Step #1: b7a169ea6d9f: Waiting Step #1: 99ec2a426bac: Waiting Step #1: 35903e68556a: Waiting Step #1: f1b6a7886e7b: Waiting Step #1: d2acd632fa33: Waiting Step #1: 1d54d6a00b25: Waiting Step #1: 03d7d741b0df: Waiting Step #1: 2d86793f2635: Waiting Step #1: 4b63d9578783: Waiting Step #1: 1c8aca0428a7: Waiting Step #1: 30d0d3658364: Waiting Step #1: 8b82f1a02e1c: Waiting Step #1: 37a70280ac0f: Waiting Step #1: 46f69de9c5f6: Waiting Step #1: 0cefac2553f1: Verifying Checksum Step #1: 0cefac2553f1: Download complete Step #1: b549f31133a9: Verifying Checksum Step #1: b549f31133a9: Download complete Step #1: 2a97cb3dcc4c: Verifying Checksum Step #1: 2a97cb3dcc4c: Download complete Step #1: 9497b68c874a: Verifying Checksum Step #1: 9497b68c874a: Download complete Step #1: 60b31369ad8f: Verifying Checksum Step #1: 60b31369ad8f: Download complete Step #1: 8f20461fc7c2: Verifying Checksum Step #1: 8f20461fc7c2: Download complete Step #1: 8fbcbf53a4e0: Verifying Checksum Step #1: 8fbcbf53a4e0: Download complete Step #1: 4d82e0d035cc: Verifying Checksum Step #1: 4d82e0d035cc: Download complete Step #1: b549f31133a9: Pull complete Step #1: c56a664ea751: Verifying Checksum Step #1: c56a664ea751: Download complete Step #1: 99ec2a426bac: Verifying Checksum Step #1: 99ec2a426bac: Download complete Step #1: f1b6a7886e7b: Verifying Checksum Step #1: f1b6a7886e7b: Download complete Step #1: 03d7d741b0df: Verifying Checksum Step #1: 03d7d741b0df: Download complete Step #1: 1c8aca0428a7: Verifying Checksum Step #1: 1c8aca0428a7: Download complete Step #1: 30d0d3658364: Verifying Checksum Step #1: 30d0d3658364: Download complete Step #1: d2acd632fa33: Verifying Checksum Step #1: d2acd632fa33: Download complete Step #1: e8dfaee9590c: Verifying Checksum Step #1: e8dfaee9590c: Download complete Step #1: 0c2b459f8992: Download complete Step #1: 084e8d272547: Verifying Checksum Step #1: 084e8d272547: Download complete Step #1: b674d1fbd06a: Verifying Checksum Step #1: b674d1fbd06a: Download complete Step #1: 35903e68556a: Download complete Step #1: 1d54d6a00b25: Verifying Checksum Step #1: 1d54d6a00b25: Download complete Step #1: 4b63d9578783: Download complete Step #1: b7a169ea6d9f: Verifying Checksum Step #1: b7a169ea6d9f: Download complete Step #1: 5847d1847d18: Verifying Checksum Step #1: 5847d1847d18: Download complete Step #1: 2d86793f2635: Verifying Checksum Step #1: 2d86793f2635: Download complete Step #1: 37a70280ac0f: Verifying Checksum Step #1: 37a70280ac0f: Download complete Step #1: 8b82f1a02e1c: Verifying Checksum Step #1: 8b82f1a02e1c: Download complete Step #1: 946352761910: Verifying Checksum Step #1: 946352761910: Download complete Step #1: 723c135ef4a9: Verifying Checksum Step #1: 723c135ef4a9: Download complete Step #1: 46f69de9c5f6: Download complete Step #1: 5e5e3c162074: Verifying Checksum Step #1: 5e5e3c162074: Download complete Step #1: 8fbcbf53a4e0: Pull complete Step #1: 0cefac2553f1: Pull complete Step #1: 9497b68c874a: Pull complete Step #1: 2a97cb3dcc4c: Pull complete Step #1: 60b31369ad8f: Pull complete Step #1: 5847d1847d18: Pull complete Step #1: 8f20461fc7c2: Pull complete Step #1: 4d82e0d035cc: Pull complete Step #1: e8dfaee9590c: Pull complete Step #1: c56a664ea751: Pull complete Step #1: 99ec2a426bac: Pull complete Step #1: f1b6a7886e7b: Pull complete Step #1: 03d7d741b0df: Pull complete Step #1: 1c8aca0428a7: Pull complete Step #1: 30d0d3658364: Pull complete Step #1: d2acd632fa33: Pull complete Step #1: 0c2b459f8992: Pull complete Step #1: 084e8d272547: Pull complete Step #1: b674d1fbd06a: Pull complete Step #1: 35903e68556a: Pull complete Step #1: 1d54d6a00b25: Pull complete Step #1: 4b63d9578783: Pull complete Step #1: 5a4ef0ea8421: Pull complete Step #1: b7a169ea6d9f: Pull complete Step #1: 2d86793f2635: Pull complete Step #1: 37a70280ac0f: Pull complete Step #1: 8b82f1a02e1c: Pull complete Step #1: 946352761910: Pull complete Step #1: 723c135ef4a9: Pull complete Step #1: 46f69de9c5f6: Pull complete Step #1: 5e5e3c162074: Pull complete Step #1: Digest: sha256:d42c2dfcf524fc5464851b045c7c4b52e2cb08bbeec1ce761a58abdc99ff1b92 Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1: ---> 7c377ab2173e Step #1: Step 2/7 : RUN apt-get update && apt-get install -y make autoconf automake libtool Step #1: ---> Running in 5373e7f9aa89 Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1: Fetched 128 kB in 1s (122 kB/s) Step #1: Reading package lists... Step #1: Reading package lists... Step #1: Building dependency tree... Step #1: Reading state information... Step #1: make is already the newest version (4.2.1-1.2). Step #1: make set to manually installed. Step #1: The following additional packages will be installed: Step #1: autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2 Step #1: m4 Step #1: Suggested packages: Step #1: autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran Step #1: | fortran95-compiler gcj-jdk m4-doc Step #1: The following NEW packages will be installed: Step #1: autoconf automake autotools-dev file libltdl-dev libltdl7 libmagic-mgc Step #1: libmagic1 libsigsegv2 libtool m4 Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded. Step #1: Need to get 1774 kB of archives. Step #1: After this operation, 12.8 MB of additional disk space will be used. Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB] Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB] Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB] Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB] Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB] Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB] Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB] Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB] Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB] Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB] Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB] Step #1: [91mdebconf: delaying package configuration, since apt-utils is not installed Step #1: [0mFetched 1774 kB in 1s (1512 kB/s) Step #1: Selecting previously unselected package libmagic-mgc. Step #1: (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17384 files and directories currently installed.) Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic-mgc (1:5.38-4) ... Step #1: Selecting previously unselected package libmagic1:amd64. Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ... Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ... Step #1: Selecting previously unselected package file. Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ... Step #1: Unpacking file (1:5.38-4) ... Step #1: Selecting previously unselected package libsigsegv2:amd64. Step #1: Preparing to unpack .../03-libsigsegv2_2.12-2_amd64.deb ... Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ... Step #1: Selecting previously unselected package m4. Step #1: Preparing to unpack .../04-m4_1.4.18-4_amd64.deb ... Step #1: Unpacking m4 (1.4.18-4) ... Step #1: Selecting previously unselected package autoconf. Step #1: Preparing to unpack .../05-autoconf_2.69-11.1_all.deb ... Step #1: Unpacking autoconf (2.69-11.1) ... Step #1: Selecting previously unselected package autotools-dev. Step #1: Preparing to unpack .../06-autotools-dev_20180224.1_all.deb ... Step #1: Unpacking autotools-dev (20180224.1) ... Step #1: Selecting previously unselected package automake. Step #1: Preparing to unpack .../07-automake_1%3a1.16.1-4ubuntu6_all.deb ... Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ... Step #1: Selecting previously unselected package libltdl7:amd64. Step #1: Preparing to unpack .../08-libltdl7_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libltdl-dev:amd64. Step #1: Preparing to unpack .../09-libltdl-dev_2.4.6-14_amd64.deb ... Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ... Step #1: Selecting previously unselected package libtool. Step #1: Preparing to unpack .../10-libtool_2.4.6-14_all.deb ... Step #1: Unpacking libtool (2.4.6-14) ... Step #1: Setting up libmagic-mgc (1:5.38-4) ... Step #1: Setting up libmagic1:amd64 (1:5.38-4) ... Step #1: Setting up file (1:5.38-4) ... Step #1: Setting up autotools-dev (20180224.1) ... Step #1: Setting up libsigsegv2:amd64 (2.12-2) ... Step #1: Setting up libltdl7:amd64 (2.4.6-14) ... Step #1: Setting up libtool (2.4.6-14) ... Step #1: Setting up m4 (1.4.18-4) ... Step #1: Setting up autoconf (2.69-11.1) ... Step #1: Setting up automake (1:1.16.1-4ubuntu6) ... Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ... Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ... Step #1: Removing intermediate container 5373e7f9aa89 Step #1: ---> 93f0782c7407 Step #1: Step 3/7 : RUN git clone --depth 1 https://gitlab.xiph.org/xiph/ogg.git Step #1: ---> Running in a0a226d0e736 Step #1: [91mCloning into 'ogg'... Step #1: [0mRemoving intermediate container a0a226d0e736 Step #1: ---> e933f6382713 Step #1: Step 4/7 : RUN git clone --depth 1 https://gitlab.xiph.org/xiph/theora.git libtheora Step #1: ---> Running in ab8841780fee Step #1: [91mCloning into 'libtheora'... Step #1: [0mRemoving intermediate container ab8841780fee Step #1: ---> c98dc08868b4 Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/guidovranken/oss-fuzz-fuzzers.git Step #1: ---> Running in 87745b6a6d05 Step #1: [91mCloning into 'oss-fuzz-fuzzers'... Step #1: [0mRemoving intermediate container 87745b6a6d05 Step #1: ---> 7a31a31fb8d5 Step #1: Step 6/7 : RUN git clone --depth 1 https://github.com/guidovranken/fuzzing-headers.git Step #1: ---> Running in 6b1af198c0b5 Step #1: [91mCloning into 'fuzzing-headers'... Step #1: [0mRemoving intermediate container 6b1af198c0b5 Step #1: ---> 008334a3e8ea Step #1: Step 7/7 : COPY build.sh $SRC/ Step #1: ---> 3c1971218b57 Step #1: Successfully built 3c1971218b57 Step #1: Successfully tagged gcr.io/oss-fuzz/libtheora:latest Finished Step #1 Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/libtheora Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/fileqiOMHL Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/fuzzing-headers/.git Step #2 - "srcmap": + GIT_DIR=/src/fuzzing-headers Step #2 - "srcmap": + cd /src/fuzzing-headers Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/fuzzing-headers.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=bbd75f2806d18009aeca0f3b8fdcc6e7a3929686 Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileSe65Gd Step #2 - "srcmap": + cat /tmp/fileqiOMHL Step #2 - "srcmap": + jq '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }' Step #2 - "srcmap": + mv /tmp/fileSe65Gd /tmp/fileqiOMHL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/oss-fuzz-fuzzers/.git Step #2 - "srcmap": + GIT_DIR=/src/oss-fuzz-fuzzers Step #2 - "srcmap": + cd /src/oss-fuzz-fuzzers Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/oss-fuzz-fuzzers.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=c958e929018bc3851e12535a67190d4044c23b56 Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/oss-fuzz-fuzzers" = { type: "git", url: "https://github.com/guidovranken/oss-fuzz-fuzzers.git", rev: "c958e929018bc3851e12535a67190d4044c23b56" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/file8AxAmK Step #2 - "srcmap": + cat /tmp/fileqiOMHL Step #2 - "srcmap": + jq '."/src/oss-fuzz-fuzzers" = { type: "git", url: "https://github.com/guidovranken/oss-fuzz-fuzzers.git", rev: "c958e929018bc3851e12535a67190d4044c23b56" }' Step #2 - "srcmap": + mv /tmp/file8AxAmK /tmp/fileqiOMHL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/libtheora/.git Step #2 - "srcmap": + GIT_DIR=/src/libtheora Step #2 - "srcmap": + cd /src/libtheora Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://gitlab.xiph.org/xiph/theora.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=7180717276af1ebc7da15c83162d6c5d6203aabf Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/libtheora" = { type: "git", url: "https://gitlab.xiph.org/xiph/theora.git", rev: "7180717276af1ebc7da15c83162d6c5d6203aabf" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/filehTpYke Step #2 - "srcmap": + cat /tmp/fileqiOMHL Step #2 - "srcmap": + jq '."/src/libtheora" = { type: "git", url: "https://gitlab.xiph.org/xiph/theora.git", rev: "7180717276af1ebc7da15c83162d6c5d6203aabf" }' Step #2 - "srcmap": + mv /tmp/filehTpYke /tmp/fileqiOMHL Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/ogg/.git Step #2 - "srcmap": + GIT_DIR=/src/ogg Step #2 - "srcmap": + cd /src/ogg Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://gitlab.xiph.org/xiph/ogg.git Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=7cf42ea17aef7bc1b7b21af70724840a96c2e7d0 Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/ogg" = { type: "git", url: "https://gitlab.xiph.org/xiph/ogg.git", rev: "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileoOTQXK Step #2 - "srcmap": + cat /tmp/fileqiOMHL Step #2 - "srcmap": + jq '."/src/ogg" = { type: "git", url: "https://gitlab.xiph.org/xiph/ogg.git", rev: "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0" }' Step #2 - "srcmap": + mv /tmp/fileoOTQXK /tmp/fileqiOMHL Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/fileqiOMHL Step #2 - "srcmap": + rm /tmp/fileqiOMHL Step #2 - "srcmap": { Step #2 - "srcmap": "/src/fuzzing-headers": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/guidovranken/fuzzing-headers.git", Step #2 - "srcmap": "rev": "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/oss-fuzz-fuzzers": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/guidovranken/oss-fuzz-fuzzers.git", Step #2 - "srcmap": "rev": "c958e929018bc3851e12535a67190d4044c23b56" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/libtheora": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://gitlab.xiph.org/xiph/theora.git", Step #2 - "srcmap": "rev": "7180717276af1ebc7da15c83162d6c5d6203aabf" Step #2 - "srcmap": }, Step #2 - "srcmap": "/src/ogg": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://gitlab.xiph.org/xiph/ogg.git", Step #2 - "srcmap": "rev": "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=address* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=memory* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/libogg-install/ Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ogg Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh Step #3 - "compile-libfuzzer-coverage-x86_64": Updating build configuration files for libogg, please wait.... Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": src/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --prefix=/src/libogg-install --enable-static --disable-shared --disable-crc Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int16_t... 2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint16_t... 2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of u_int16_t... 2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int32_t... 4 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint32_t... 4 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of u_int32_t... 4 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int64_t... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint64_t... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of short... 2 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int... 4 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long long... 8 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working memcmp... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/libogg/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/ogg/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/ogg/config_types.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libogg.spec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating ogg.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating ogg-uninstalled.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT test_bitwise-bitwise.o -MD -MP -MF .deps/test_bitwise-bitwise.Tpo -c -o test_bitwise-bitwise.o `test -f 'bitwise.c' || echo './'`bitwise.c Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT test_framing-framing.o -MD -MP -MF .deps/test_framing-framing.Tpo -c -o test_framing-framing.o `test -f 'framing.c' || echo './'`framing.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT framing.lo -MD -MP -MF .deps/framing.Tpo -c -o framing.lo framing.c Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=compile clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT bitwise.lo -MD -MP -MF .deps/bitwise.Tpo -c -o bitwise.lo bitwise.c Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT framing.lo -MD -MP -MF .deps/framing.Tpo -c framing.c -o framing.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile: clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT bitwise.lo -MD -MP -MF .deps/bitwise.Tpo -c bitwise.c -o bitwise.o Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/bitwise.Tpo .deps/bitwise.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/framing.Tpo .deps/framing.Plo Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -no-undefined -version-info 8:5:8 -o libogg.la -rpath /src/libogg-install/lib framing.lo bitwise.lo Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/test_bitwise-bitwise.Tpo .deps/test_bitwise-bitwise.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_bitwise test_bitwise-bitwise.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libogg.a framing.o bitwise.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libogg.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libogg.la" && ln -s "../libogg.la" "libogg.la" ) Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_bitwise test_bitwise-bitwise.o -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/test_framing-framing.Tpo .deps/test_framing-framing.Po Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --tag=CC --mode=link clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_framing test_framing-framing.o Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_framing test_framing-framing.o -pthread Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in ogg Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in libogg Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": + make install Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in src Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool --mode=install /usr/bin/install -c libogg.la '/src/libogg-install/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libogg.lai /src/libogg-install/lib/libogg.la Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libogg.a /src/libogg-install/lib/libogg.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /src/libogg-install/lib/libogg.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /src/libogg-install/lib/libogg.a Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /src/libogg-install/lib Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in: Step #3 - "compile-libfuzzer-coverage-x86_64": /src/libogg-install/lib Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR' Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following: Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during execution Step #3 - "compile-libfuzzer-coverage-x86_64": - add LIBDIR to the 'LD_RUN_PATH' environment variable Step #3 - "compile-libfuzzer-coverage-x86_64": during linking Step #3 - "compile-libfuzzer-coverage-x86_64": - use the '-Wl,-rpath -Wl,LIBDIR' linker flag Step #3 - "compile-libfuzzer-coverage-x86_64": - have your system administrator add LIBDIR to '/etc/ld.so.conf' Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages. Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/src' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in ogg Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 config_types.h '/src/libogg-install/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ogg.h os_types.h '/src/libogg-install/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-data-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in libogg Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/share/doc/libogg/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 bitpacking.html datastructures.html decoding.html encoding.html general.html index.html ogg_iovec_t.html ogg_packet.html ogg_packet_clear.html ogg_page.html ogg_page_bos.html ogg_page_checksum_set.html ogg_page_continued.html ogg_page_eos.html ogg_page_granulepos.html ogg_page_packets.html ogg_page_pageno.html ogg_page_serialno.html ogg_page_version.html ogg_stream_check.html ogg_stream_clear.html ogg_stream_destroy.html ogg_stream_eos.html ogg_stream_flush.html ogg_stream_flush_fill.html ogg_stream_init.html ogg_stream_iovecin.html ogg_stream_packetin.html ogg_stream_packetout.html ogg_stream_packetpeek.html ogg_stream_pagein.html ogg_stream_pageout.html ogg_stream_pageout_fill.html ogg_stream_reset.html ogg_stream_reset_serialno.html ogg_stream_state.html ogg_sync_buffer.html ogg_sync_check.html ogg_sync_clear.html ogg_sync_destroy.html '/src/libogg-install/share/doc/libogg/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ogg_sync_init.html ogg_sync_pageout.html ogg_sync_pageseek.html ogg_sync_reset.html ogg_sync_state.html ogg_sync_wrote.html oggpack_adv.html oggpack_adv1.html oggpack_bits.html oggpack_buffer.html oggpack_bytes.html oggpack_get_buffer.html oggpack_look.html oggpack_look1.html oggpack_read.html oggpack_read1.html oggpack_readinit.html oggpack_reset.html oggpack_write.html oggpack_writealign.html oggpack_writecheck.html oggpack_writeclear.html oggpack_writecopy.html oggpack_writeinit.html oggpack_writetrunc.html overview.html reference.html style.css '/src/libogg-install/share/doc/libogg/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/share/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 framing.html index.html oggstream.html ogg-multiplex.html fish_xiph_org.png multiplex1.png packets.png pages.png stream.png vorbisword2.png white-ogg.png white-xifish.png rfc3533.txt rfc5334.txt skeleton.html '/src/libogg-install/share/doc/libogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/share/aclocal' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ogg.m4 '/src/libogg-install/share/aclocal' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/mkdir -p '/src/libogg-install/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/bin/install -c -m 644 ogg.pc '/src/libogg-install/lib/pkgconfig' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/fuzzing-headers/ Step #3 - "compile-libfuzzer-coverage-x86_64": + ./install.sh Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/libtheora/ Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh Step #3 - "compile-libfuzzer-coverage-x86_64": Updating build configuration files, please wait.... Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file './ltmain.sh' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'. Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/libtool.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltoptions.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltsugar.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltversion.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/lt~obsolete.m4' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:56: installing './compile' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.guess' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.sub' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:12: installing './install-sh' Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:12: installing './missing' Step #3 - "compile-libfuzzer-coverage-x86_64": doc/spec/Makefile.am: installing './depcomp' Step #3 - "compile-libfuzzer-coverage-x86_64": lib/Makefile.am:304: warning: '%'-style pattern rules are a GNU make extension Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing './test-driver' Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=memory* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *-m32* ]] Step #3 - "compile-libfuzzer-coverage-x86_64": + LD_LIBRARY_PATH=/src/libogg-install/lib Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --with-ogg=/src/libogg-install --disable-encode --disable-examples --enable-static --disable-shared Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style) Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864 Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... dlltool Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @ Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1 Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for doxygen... false Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: *** doxygen not found, API documentation will not be built Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pdflatex... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bibtex... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fig2dev... no Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Checking for packages in ./doc/spec/spec.tex... Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: *** Format Specification will not built. Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... (cached) /usr/bin/ld Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... (cached) yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to control symbol export... --version-script Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Ogg... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for oggpackB_read... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Vorbis... no Step #3 - "compile-libfuzzer-coverage-x86_64": *** Could not run Vorbis test program, checking why... Step #3 - "compile-libfuzzer-coverage-x86_64": *** The test program failed to compile or link. See the file config.log for the Step #3 - "compile-libfuzzer-coverage-x86_64": *** exact error that occured. This usually means Vorbis was incorrectly installed Step #3 - "compile-libfuzzer-coverage-x86_64": *** or that you have moved Vorbis since it was installed. Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/soundcard.h usability... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/soundcard.h presence... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/soundcard.h... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking for TIFFReadRGBAImage in -ltiff... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ftime in -lcompat... no Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getopt_long... yes Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lib/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lib/arm/armopts.s Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/theora/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Doxyfile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/spec/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating m4/Makefile Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libtheora.spec Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theora.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theora-uninstalled.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoradec.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoradec-uninstalled.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoraenc.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoraenc-uninstalled.pc Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ------------------------------------------------------------------------ Step #3 - "compile-libfuzzer-coverage-x86_64": libtheora 1.2.0alpha1+git: Automatic configuration OK. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": General configuration: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Encoding support: ........... no Step #3 - "compile-libfuzzer-coverage-x86_64": Assembly optimization: ...... 64 bit x86 Step #3 - "compile-libfuzzer-coverage-x86_64": Debugging telemetry: ........ no Step #3 - "compile-libfuzzer-coverage-x86_64": Abort on huge files: ........ no Step #3 - "compile-libfuzzer-coverage-x86_64": Build example code: ......... no Step #3 - "compile-libfuzzer-coverage-x86_64": API Documentation: .......... no Step #3 - "compile-libfuzzer-coverage-x86_64": Format Documentation: ....... no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Installation paths: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": libtheora: ................... /usr/local/lib Step #3 - "compile-libfuzzer-coverage-x86_64": C header files: .............. /usr/local/include/theora Step #3 - "compile-libfuzzer-coverage-x86_64": Documentation: ............... /usr/local/share/doc/libtheora Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Building: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Type 'make' to compile libtheora. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Type 'make install' to install libtheora. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Type 'make check' to run test suite (Valgrind testing not enabled) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Example programs will be built but not installed. Step #3 - "compile-libfuzzer-coverage-x86_64": ------------------------------------------------------------------------ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": make all-recursive Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libtheora' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in lib Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": make all-am Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": CC apiwrapper.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC bitpack.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC decapiwrapper.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC decinfo.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC decode.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC dequant.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC huffdec.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC fragment.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC idct.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC info.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC internal.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC quant.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC state.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC encoder_disabled.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/x86cpu.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/mmxidct.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/mmxfrag.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/mmxstate.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/sse2idct.lo Step #3 - "compile-libfuzzer-coverage-x86_64": CC x86/x86state.lo Step #3 - "compile-libfuzzer-coverage-x86_64": [1mdecode.c:195:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 195 | OC_DCT_CW_PACK( 0,10, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:198:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 198 | OC_DCT_CW_PACK( 0, 0, 0,1),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:208:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 208 | OC_DCT_CW_PACK( 0, 1, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:210:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 210 | OC_DCT_CW_PACK( 0, 2, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:212:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 212 | OC_DCT_CW_PACK( 0, 3, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:214:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 214 | OC_DCT_CW_PACK( 0, 4, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:216:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 216 | OC_DCT_CW_PACK( 0, 5, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:220:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 220 | OC_DCT_CW_PACK( 0, 1, -2,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:221:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 221 | OC_DCT_CW_PACK( 0, 1, -3,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:227:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 227 | OC_DCT_CW_PACK( 0, 6, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:228:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 228 | OC_DCT_CW_PACK( 0, 7, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:229:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 229 | OC_DCT_CW_PACK( 0, 8, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:230:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 230 | OC_DCT_CW_PACK( 0, 9, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:236:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 236 | OC_DCT_CW_PACK( 0, 2, -2,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:237:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 237 | OC_DCT_CW_PACK( 0, 3, -2,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:238:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 238 | OC_DCT_CW_PACK( 0, 2, -3,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:239:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 239 | OC_DCT_CW_PACK( 0, 3, -3,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:242:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 242 | OC_DCT_CW_PACK( 0, 0, 0,1),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:253:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 253 | OC_DCT_CW_PACK( 0, 0, -1,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:257:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 257 | OC_DCT_CW_PACK( 0, 0, -2,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:260:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 260 | OC_DCT_CW_PACK( 0, 0, -3,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:262:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 262 | OC_DCT_CW_PACK( 0, 0, -4,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:264:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 264 | OC_DCT_CW_PACK( 0, 0, -5,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:266:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 266 | OC_DCT_CW_PACK( 0, 0, -6,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:270:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 270 | OC_DCT_CW_PACK( 0, 0, -7,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:271:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 271 | OC_DCT_CW_PACK( 0, 0, -8,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:277:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 277 | OC_DCT_CW_PACK( 0, 0, -9,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:278:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 278 | OC_DCT_CW_PACK( 0, 0,-10,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:279:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 279 | OC_DCT_CW_PACK( 0, 0,-11,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:280:3: [0m[0;1;35mwarning: [0m[1mshifting a negative signed value is undefined [-Wshift-negative-value][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 280 | OC_DCT_CW_PACK( 0, 0,-12,0),[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mdecode.c:150:16: [0m[0;1;30mnote: [0mexpanded from macro 'OC_DCT_CW_PACK'[0m Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ~~~~~~~~~~~~~~^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m[1mhuffdec.c:439:7: [0m[0;1;35mwarning: [0m[1mvariable 'total' set but not used [-Wunused-but-set-variable][0m Step #3 - "compile-libfuzzer-coverage-x86_64": 439 | int total;[0m Step #3 - "compile-libfuzzer-coverage-x86_64": | [0;1;32m ^ Step #3 - "compile-libfuzzer-coverage-x86_64": [0m1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 30 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtheoradec.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtheora.la Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD libtheoraenc.la Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/lib' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in theora Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/include/theora' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/include/theora' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/include' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/include' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in spec Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/doc/spec' Step #3 - "compile-libfuzzer-coverage-x86_64": CC vp3huff.o Step #3 - "compile-libfuzzer-coverage-x86_64": CCLD vp3huff Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/doc/spec' Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": echo "*** Warning: Doxygen not found; documentation will not be built." Step #3 - "compile-libfuzzer-coverage-x86_64": *** Warning: Doxygen not found; documentation will not be built. Step #3 - "compile-libfuzzer-coverage-x86_64": touch doxygen-build.stamp Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/doc' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in tests Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/tests' Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in m4 Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/m4' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'. Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/m4' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora' Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora' Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libtheora' Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/oss-fuzz-fuzzers/libtheora/ Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -I /src/libtheora/include/ -I /src/libogg-install/include fuzzer.cpp /src/libtheora/lib/.libs/libtheora.a -fsanitize=fuzzer -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer-decoder Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: 8fbcbf53a4e0: Already exists Step #4: 0cefac2553f1: Already exists Step #4: ee0bd9a22eea: Pulling fs layer Step #4: 130d25f83adf: Pulling fs layer Step #4: f0264da68732: Pulling fs layer Step #4: 5814f959d749: Pulling fs layer Step #4: 7ead214ec6f8: Pulling fs layer Step #4: 1bb2940da840: Pulling fs layer Step #4: e19785e9b2c6: Pulling fs layer Step #4: 7b0133017c68: Pulling fs layer Step #4: 00bfbd2ee689: Pulling fs layer Step #4: c3db59c793f3: Pulling fs layer Step #4: d086feb0d1ad: Pulling fs layer Step #4: 985b0d452b72: Pulling fs layer Step #4: 4f8d69fba4e3: Pulling fs layer Step #4: 2832d7575ad0: Pulling fs layer Step #4: c9ccffaa82c8: Pulling fs layer Step #4: 4e3f7874f902: Pulling fs layer Step #4: 6961b38d59d4: Pulling fs layer Step #4: 00bfbd2ee689: Waiting Step #4: 7ead214ec6f8: Waiting Step #4: c3db59c793f3: Waiting Step #4: d086feb0d1ad: Waiting Step #4: 1bb2940da840: Waiting Step #4: 985b0d452b72: Waiting Step #4: e19785e9b2c6: Waiting Step #4: 4f8d69fba4e3: Waiting Step #4: 7b0133017c68: Waiting Step #4: 2832d7575ad0: Waiting Step #4: 6961b38d59d4: Waiting Step #4: c9ccffaa82c8: Waiting Step #4: 4e3f7874f902: Waiting Step #4: 5814f959d749: Waiting Step #4: f0264da68732: Download complete Step #4: ee0bd9a22eea: Verifying Checksum Step #4: 130d25f83adf: Verifying Checksum Step #4: 130d25f83adf: Download complete Step #4: ee0bd9a22eea: Pull complete Step #4: 1bb2940da840: Verifying Checksum Step #4: 1bb2940da840: Download complete Step #4: e19785e9b2c6: Verifying Checksum Step #4: e19785e9b2c6: Download complete Step #4: 130d25f83adf: Pull complete Step #4: 7ead214ec6f8: Verifying Checksum Step #4: 7ead214ec6f8: Download complete Step #4: f0264da68732: Pull complete Step #4: 00bfbd2ee689: Verifying Checksum Step #4: 00bfbd2ee689: Download complete Step #4: 7b0133017c68: Verifying Checksum Step #4: 7b0133017c68: Download complete Step #4: 5814f959d749: Verifying Checksum Step #4: 5814f959d749: Download complete Step #4: d086feb0d1ad: Verifying Checksum Step #4: d086feb0d1ad: Download complete Step #4: 985b0d452b72: Verifying Checksum Step #4: 985b0d452b72: Download complete Step #4: 4f8d69fba4e3: Verifying Checksum Step #4: 4f8d69fba4e3: Download complete Step #4: 2832d7575ad0: Verifying Checksum Step #4: 2832d7575ad0: Download complete Step #4: c9ccffaa82c8: Download complete Step #4: 4e3f7874f902: Download complete Step #4: c3db59c793f3: Verifying Checksum Step #4: c3db59c793f3: Download complete Step #4: 6961b38d59d4: Verifying Checksum Step #4: 6961b38d59d4: Download complete Step #4: 5814f959d749: Pull complete Step #4: 7ead214ec6f8: Pull complete Step #4: 1bb2940da840: Pull complete Step #4: e19785e9b2c6: Pull complete Step #4: 7b0133017c68: Pull complete Step #4: 00bfbd2ee689: Pull complete Step #4: c3db59c793f3: Pull complete Step #4: d086feb0d1ad: Pull complete Step #4: 985b0d452b72: Pull complete Step #4: 4f8d69fba4e3: Pull complete Step #4: 2832d7575ad0: Pull complete Step #4: c9ccffaa82c8: Pull complete Step #4: 4e3f7874f902: Pull complete Step #4: 6961b38d59d4: Pull complete Step #4: Digest: sha256:a7e4071f89ac8faa29e6011d41f34814d55cc50247e64438a27275243b7c2a62 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running fuzzer-decoder Step #5: [2024-09-20 06:21:27,091 INFO] Finding shared libraries for targets (if any). Step #5: [2024-09-20 06:21:27,101 INFO] Finished finding shared libraries for targets. Step #5: [2024-09-20 06:21:27,242 INFO] Finding shared libraries for targets (if any). Step #5: [2024-09-20 06:21:27,252 INFO] Finished finding shared libraries for targets. Step #5: [2024-09-20 06:21:27,394 DEBUG] Finished generating per-file code coverage summary. Step #5: [2024-09-20 06:21:27,394 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html". Step #5: [2024-09-20 06:21:27,408 DEBUG] Finished generating file view html index file. Step #5: [2024-09-20 06:21:27,408 DEBUG] Calculating per-directory coverage summary. Step #5: [2024-09-20 06:21:27,408 DEBUG] Finished calculating per-directory coverage summary. Step #5: [2024-09-20 06:21:27,408 DEBUG] Writing per-directory coverage html reports. Step #5: [2024-09-20 06:21:27,481 DEBUG] Finished writing per-directory coverage html reports. Step #5: [2024-09-20 06:21:27,481 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html". Step #5: [2024-09-20 06:21:27,481 DEBUG] Finished generating directory view html index file. Step #5: [2024-09-20 06:21:27,481 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html". Step #5: [2024-09-20 06:21:27,624 DEBUG] Finished generating per-file code coverage summary. Step #5: [2024-09-20 06:21:27,624 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/file_view_index.html". Step #5: [2024-09-20 06:21:27,638 DEBUG] Finished generating file view html index file. Step #5: [2024-09-20 06:21:27,638 DEBUG] Calculating per-directory coverage summary. Step #5: [2024-09-20 06:21:27,638 DEBUG] Finished calculating per-directory coverage summary. Step #5: [2024-09-20 06:21:27,638 DEBUG] Writing per-directory coverage html reports. Step #5: [2024-09-20 06:21:27,712 DEBUG] Finished writing per-directory coverage html reports. Step #5: [2024-09-20 06:21:27,712 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/directory_view_index.html". Step #5: [2024-09-20 06:21:27,712 DEBUG] Finished generating directory view html index file. Step #5: [2024-09-20 06:21:27,712 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/index.html". Finished Step #5 Starting Step #6 Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #6: CommandException: 1 files/objects could not be removed. Finished Step #6 Starting Step #7 Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/style.css [Content-Type=text/css]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/report.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/report.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libogg-install/include/ogg/os_types.h.html [Content-Type=text/html]... Step #7: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/report.html [Content-Type=text/html]... Step #7: / [0/40 files][ 2.5 KiB/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/libtheora/fuzzer.cpp.html [Content-Type=text/html]... Step #7: / [0/40 files][ 2.5 KiB/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/huffman.h.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/libtheora/report.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/report.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/theora.h.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/theoradec.h.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decode.c.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/state.c.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/huffdec.c.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/quant.c.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/state.h.html [Content-Type=text/html]... Step #7: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done / [1/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/codec.h.html [Content-Type=text/html]... Step #7: / [1/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done / [2/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/bitpack.h.html [Content-Type=text/html]... Step #7: / [2/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/internal.c.html [Content-Type=text/html]... Step #7: / [2/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decint.h.html [Content-Type=text/html]... Step #7: / [2/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decinfo.c.html [Content-Type=text/html]... Step #7: / [2/40 files][ 45.7 KiB/ 2.1 MiB] 2% Done / [3/40 files][ 73.6 KiB/ 2.1 MiB] 3% Done / [4/40 files][ 73.6 KiB/ 2.1 MiB] 3% Done / [5/40 files][ 73.6 KiB/ 2.1 MiB] 3% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/bitpack.c.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/report.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/dequant.c.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/internal.h.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/ocintrin.h.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/info.c.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86cpu.h.html [Content-Type=text/html]... Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86state.c.html [Content-Type=text/html]... Step #7: / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done / [5/40 files][115.5 KiB/ 2.1 MiB] 5% Done / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86cpu.c.html [Content-Type=text/html]... Step #7: / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86int.h.html [Content-Type=text/html]... Step #7: / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxfrag.c.html [Content-Type=text/html]... Step #7: / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/report.html [Content-Type=text/html]... Step #7: / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxloop.h.html [Content-Type=text/html]... Step #7: / [6/40 files][115.5 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/sse2idct.c.html [Content-Type=text/html]... Step #7: / [6/40 files][119.8 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxstate.c.html [Content-Type=text/html]... Step #7: / [6/40 files][119.8 KiB/ 2.1 MiB] 5% Done / [7/40 files][124.1 KiB/ 2.1 MiB] 5% Done / [8/40 files][124.1 KiB/ 2.1 MiB] 5% Done / [9/40 files][124.1 KiB/ 2.1 MiB] 5% Done / [10/40 files][124.1 KiB/ 2.1 MiB] 5% Done / [11/40 files][124.1 KiB/ 2.1 MiB] 5% Done / [12/40 files][562.5 KiB/ 2.1 MiB] 26% Done / [13/40 files][562.5 KiB/ 2.1 MiB] 26% Done / [14/40 files][ 1.2 MiB/ 2.1 MiB] 57% Done / [15/40 files][ 1.3 MiB/ 2.1 MiB] 60% Done / [16/40 files][ 1.3 MiB/ 2.1 MiB] 60% Done / [17/40 files][ 1.3 MiB/ 2.1 MiB] 60% Done / [18/40 files][ 1.3 MiB/ 2.1 MiB] 62% Done / [19/40 files][ 1.4 MiB/ 2.1 MiB] 64% Done - - [20/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done - [21/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [22/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [23/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [24/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [25/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [26/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [27/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [28/40 files][ 1.4 MiB/ 2.1 MiB] 68% Done - [29/40 files][ 1.6 MiB/ 2.1 MiB] 77% Done - [30/40 files][ 1.6 MiB/ 2.1 MiB] 77% Done - [31/40 files][ 1.6 MiB/ 2.1 MiB] 77% Done - [32/40 files][ 1.6 MiB/ 2.1 MiB] 77% Done - [33/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [34/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [35/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [36/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [37/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [38/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [39/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [40/40 files][ 2.1 MiB/ 2.1 MiB] 100% Done Step #7: Operation completed over 40 objects/2.1 MiB. Finished Step #7 Starting Step #8 Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #8: CommandException: 1 files/objects could not be removed. Finished Step #8 Starting Step #9 Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/style.css [Content-Type=text/css]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/summary.json [Content-Type=application/json]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/directory_view_index.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/file_view_index.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/report.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/index.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/report.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/report.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/libtheora/fuzzer.cpp.html [Content-Type=text/html]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libogg-install/include/ogg/os_types.h.html [Content-Type=text/html]... Step #9: / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done / [0/40 files][ 0.0 B/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/libtheora/report.html [Content-Type=text/html]... Step #9: / [0/40 files][ 12.8 KiB/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/report.html [Content-Type=text/html]... Step #9: / [0/40 files][ 12.8 KiB/ 2.1 MiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/theora.h.html [Content-Type=text/html]... Step #9: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/theoradec.h.html [Content-Type=text/html]... Step #9: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/codec.h.html [Content-Type=text/html]... Step #9: / [0/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done / [1/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/huffman.h.html [Content-Type=text/html]... Step #9: / [1/40 files][ 27.9 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/huffdec.c.html [Content-Type=text/html]... Step #9: / [1/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decode.c.html [Content-Type=text/html]... Step #9: / [1/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done / [2/40 files][ 28.1 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/state.c.html [Content-Type=text/html]... Step #9: / [2/40 files][ 32.4 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/quant.c.html [Content-Type=text/html]... Step #9: / [2/40 files][ 32.4 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/bitpack.h.html [Content-Type=text/html]... Step #9: / [2/40 files][ 37.2 KiB/ 2.1 MiB] 1% Done / [3/40 files][ 41.5 KiB/ 2.1 MiB] 1% Done / [4/40 files][ 41.5 KiB/ 2.1 MiB] 1% Done / [5/40 files][ 41.5 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/internal.c.html [Content-Type=text/html]... Step #9: / [5/40 files][ 41.5 KiB/ 2.1 MiB] 1% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decint.h.html [Content-Type=text/html]... Step #9: / [5/40 files][106.9 KiB/ 2.1 MiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/state.h.html [Content-Type=text/html]... Step #9: / [5/40 files][106.9 KiB/ 2.1 MiB] 4% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decinfo.c.html [Content-Type=text/html]... Step #9: / [5/40 files][124.1 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/bitpack.c.html [Content-Type=text/html]... Step #9: / [5/40 files][124.1 KiB/ 2.1 MiB] 5% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/report.html [Content-Type=text/html]... Step #9: / [5/40 files][271.4 KiB/ 2.1 MiB] 12% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/dequant.c.html [Content-Type=text/html]... Step #9: / [6/40 files][336.0 KiB/ 2.1 MiB] 15% Done / [6/40 files][336.0 KiB/ 2.1 MiB] 15% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/internal.h.html [Content-Type=text/html]... Step #9: / [6/40 files][546.0 KiB/ 2.1 MiB] 25% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/info.c.html [Content-Type=text/html]... Step #9: / [6/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/ocintrin.h.html [Content-Type=text/html]... Step #9: / [6/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86state.c.html [Content-Type=text/html]... Step #9: / [6/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86cpu.h.html [Content-Type=text/html]... Step #9: / [6/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86int.h.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done / [7/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86cpu.c.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.1 MiB/ 2.1 MiB] 52% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxfrag.c.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/report.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxloop.h.html [Content-Type=text/html]... Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/sse2idct.c.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [7/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxstate.c.html [Content-Type=text/html]... Step #9: / [7/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [8/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [9/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [10/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [11/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [12/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [13/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [14/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [15/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [16/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [17/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [18/40 files][ 1.4 MiB/ 2.1 MiB] 65% Done / [19/40 files][ 1.5 MiB/ 2.1 MiB] 72% Done / [20/40 files][ 1.5 MiB/ 2.1 MiB] 72% Done - - [21/40 files][ 1.7 MiB/ 2.1 MiB] 82% Done - [22/40 files][ 1.7 MiB/ 2.1 MiB] 82% Done - [23/40 files][ 1.9 MiB/ 2.1 MiB] 88% Done - [24/40 files][ 1.9 MiB/ 2.1 MiB] 88% Done - [25/40 files][ 1.9 MiB/ 2.1 MiB] 92% Done - [26/40 files][ 2.0 MiB/ 2.1 MiB] 94% Done - [27/40 files][ 2.0 MiB/ 2.1 MiB] 94% Done - [28/40 files][ 2.0 MiB/ 2.1 MiB] 94% Done - [29/40 files][ 2.0 MiB/ 2.1 MiB] 94% Done - [30/40 files][ 2.0 MiB/ 2.1 MiB] 94% Done - [31/40 files][ 2.0 MiB/ 2.1 MiB] 96% Done - [32/40 files][ 2.0 MiB/ 2.1 MiB] 96% Done - [33/40 files][ 2.0 MiB/ 2.1 MiB] 96% Done - [34/40 files][ 2.0 MiB/ 2.1 MiB] 96% Done - [35/40 files][ 2.0 MiB/ 2.1 MiB] 96% Done - [36/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [37/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [38/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [39/40 files][ 2.1 MiB/ 2.1 MiB] 99% Done - [40/40 files][ 2.1 MiB/ 2.1 MiB] 100% Done Step #9: Operation completed over 40 objects/2.1 MiB. Finished Step #9 Starting Step #10 Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #10: CommandException: 1 files/objects could not be removed. Finished Step #10 Starting Step #11 Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzzer-decoder.json [Content-Type=application/json]... Step #11: / [0/2 files][ 0.0 B/ 10.4 KiB] 0% Done Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]... Step #11: / [0/2 files][ 0.0 B/ 10.4 KiB] 0% Done / [1/2 files][ 10.4 KiB/ 10.4 KiB] 99% Done / [2/2 files][ 10.4 KiB/ 10.4 KiB] 100% Done Step #11: Operation completed over 2 objects/10.4 KiB. Finished Step #11 Starting Step #12 Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #12: CommandException: 1 files/objects could not be removed. Finished Step #12 Starting Step #13 Step #13: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/textcov_reports/fuzzer-decoder.covreport [Content-Type=application/octet-stream]... Step #13: / [0/1 files][ 0.0 B/281.0 KiB] 0% Done / [1/1 files][281.0 KiB/281.0 KiB] 100% Done Step #13: Operation completed over 1 objects/281.0 KiB. Finished Step #13 Starting Step #14 Step #14: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #14: CommandException: 1 files/objects could not be removed. Finished Step #14 Starting Step #15 Step #15: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #15: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzzer-decoder.log [Content-Type=application/octet-stream]... Step #15: / [0/1 files][ 0.0 B/ 1.6 KiB] 0% Done / [1/1 files][ 1.6 KiB/ 1.6 KiB] 100% Done Step #15: Operation completed over 1 objects/1.6 KiB. Finished Step #15 Starting Step #16 Step #16: Already have image (with digest): gcr.io/cloud-builders/gsutil Step #16: Copying file:///workspace/srcmap.json [Content-Type=application/json]... Step #16: / [0 files][ 0.0 B/ 648.0 B] / [1 files][ 648.0 B/ 648.0 B] Step #16: Operation completed over 1 objects/648.0 B. Finished Step #16 Starting Step #17 Step #17: Already have image (with digest): gcr.io/cloud-builders/curl Step #17: Step #17: ***** NOTICE ***** Step #17: Step #17: Supported `curl` versions can be found in the various images available at Step #17: https://console.cloud.google.com/launcher/details/google/ubuntu1604. Step #17: Step #17: ***** END OF NOTICE ***** Step #17: Step #17: % Total % Received % Xferd Average Speed Time Time Time Current Step #17: Dload Upload Total Spent Left Speed Step #17: 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 100 315 0 0 100 315 0 1640 --:--:-- --:--:-- --:--:-- 1649 Finished Step #17 PUSH DONE