starting build "07de5054-f4f3-4dca-bc3c-a7e10e5eda3a"

FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon  6.656kB

Step #1: Step 1/7 : FROM gcr.io/oss-fuzz-base/base-builder
Step #1: latest: Pulling from oss-fuzz-base/base-builder
Step #1: b549f31133a9: Pulling fs layer
Step #1: 8fbcbf53a4e0: Pulling fs layer
Step #1: 0cefac2553f1: Pulling fs layer
Step #1: 9497b68c874a: Pulling fs layer
Step #1: 2a97cb3dcc4c: Pulling fs layer
Step #1: 60b31369ad8f: Pulling fs layer
Step #1: 5847d1847d18: Pulling fs layer
Step #1: 8f20461fc7c2: Pulling fs layer
Step #1: 4d82e0d035cc: Pulling fs layer
Step #1: e8dfaee9590c: Pulling fs layer
Step #1: c56a664ea751: Pulling fs layer
Step #1: 99ec2a426bac: Pulling fs layer
Step #1: f1b6a7886e7b: Pulling fs layer
Step #1: 03d7d741b0df: Pulling fs layer
Step #1: 1c8aca0428a7: Pulling fs layer
Step #1: 30d0d3658364: Pulling fs layer
Step #1: d2acd632fa33: Pulling fs layer
Step #1: 0c2b459f8992: Pulling fs layer
Step #1: 084e8d272547: Pulling fs layer
Step #1: b674d1fbd06a: Pulling fs layer
Step #1: 35903e68556a: Pulling fs layer
Step #1: 1d54d6a00b25: Pulling fs layer
Step #1: 4b63d9578783: Pulling fs layer
Step #1: 5a4ef0ea8421: Pulling fs layer
Step #1: b7a169ea6d9f: Pulling fs layer
Step #1: 2d86793f2635: Pulling fs layer
Step #1: 37a70280ac0f: Pulling fs layer
Step #1: 8b82f1a02e1c: Pulling fs layer
Step #1: 946352761910: Pulling fs layer
Step #1: 9497b68c874a: Waiting
Step #1: 723c135ef4a9: Pulling fs layer
Step #1: 46f69de9c5f6: Pulling fs layer
Step #1: 2a97cb3dcc4c: Waiting
Step #1: 5e5e3c162074: Pulling fs layer
Step #1: 60b31369ad8f: Waiting
Step #1: 5847d1847d18: Waiting
Step #1: 946352761910: Waiting
Step #1: 8f20461fc7c2: Waiting
Step #1: 723c135ef4a9: Waiting
Step #1: 4d82e0d035cc: Waiting
Step #1: 0c2b459f8992: Waiting
Step #1: e8dfaee9590c: Waiting
Step #1: 084e8d272547: Waiting
Step #1: 5a4ef0ea8421: Waiting
Step #1: c56a664ea751: Waiting
Step #1: b674d1fbd06a: Waiting
Step #1: b7a169ea6d9f: Waiting
Step #1: 99ec2a426bac: Waiting
Step #1: 35903e68556a: Waiting
Step #1: f1b6a7886e7b: Waiting
Step #1: d2acd632fa33: Waiting
Step #1: 1d54d6a00b25: Waiting
Step #1: 03d7d741b0df: Waiting
Step #1: 2d86793f2635: Waiting
Step #1: 4b63d9578783: Waiting
Step #1: 1c8aca0428a7: Waiting
Step #1: 30d0d3658364: Waiting
Step #1: 8b82f1a02e1c: Waiting
Step #1: 37a70280ac0f: Waiting
Step #1: 46f69de9c5f6: Waiting
Step #1: 0cefac2553f1: Verifying Checksum
Step #1: 0cefac2553f1: Download complete
Step #1: b549f31133a9: Verifying Checksum
Step #1: b549f31133a9: Download complete
Step #1: 2a97cb3dcc4c: Verifying Checksum
Step #1: 2a97cb3dcc4c: Download complete
Step #1: 9497b68c874a: Verifying Checksum
Step #1: 9497b68c874a: Download complete
Step #1: 60b31369ad8f: Verifying Checksum
Step #1: 60b31369ad8f: Download complete
Step #1: 8f20461fc7c2: Verifying Checksum
Step #1: 8f20461fc7c2: Download complete
Step #1: 8fbcbf53a4e0: Verifying Checksum
Step #1: 8fbcbf53a4e0: Download complete
Step #1: 4d82e0d035cc: Verifying Checksum
Step #1: 4d82e0d035cc: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: c56a664ea751: Verifying Checksum
Step #1: c56a664ea751: Download complete
Step #1: 99ec2a426bac: Verifying Checksum
Step #1: 99ec2a426bac: Download complete
Step #1: f1b6a7886e7b: Verifying Checksum
Step #1: f1b6a7886e7b: Download complete
Step #1: 03d7d741b0df: Verifying Checksum
Step #1: 03d7d741b0df: Download complete
Step #1: 1c8aca0428a7: Verifying Checksum
Step #1: 1c8aca0428a7: Download complete
Step #1: 30d0d3658364: Verifying Checksum
Step #1: 30d0d3658364: Download complete
Step #1: d2acd632fa33: Verifying Checksum
Step #1: d2acd632fa33: Download complete
Step #1: e8dfaee9590c: Verifying Checksum
Step #1: e8dfaee9590c: Download complete
Step #1: 0c2b459f8992: Download complete
Step #1: 084e8d272547: Verifying Checksum
Step #1: 084e8d272547: Download complete
Step #1: b674d1fbd06a: Verifying Checksum
Step #1: b674d1fbd06a: Download complete
Step #1: 35903e68556a: Download complete
Step #1: 1d54d6a00b25: Verifying Checksum
Step #1: 1d54d6a00b25: Download complete
Step #1: 4b63d9578783: Download complete
Step #1: b7a169ea6d9f: Verifying Checksum
Step #1: b7a169ea6d9f: Download complete
Step #1: 5847d1847d18: Verifying Checksum
Step #1: 5847d1847d18: Download complete
Step #1: 2d86793f2635: Verifying Checksum
Step #1: 2d86793f2635: Download complete
Step #1: 37a70280ac0f: Verifying Checksum
Step #1: 37a70280ac0f: Download complete
Step #1: 8b82f1a02e1c: Verifying Checksum
Step #1: 8b82f1a02e1c: Download complete
Step #1: 946352761910: Verifying Checksum
Step #1: 946352761910: Download complete
Step #1: 723c135ef4a9: Verifying Checksum
Step #1: 723c135ef4a9: Download complete
Step #1: 46f69de9c5f6: Download complete
Step #1: 5e5e3c162074: Verifying Checksum
Step #1: 5e5e3c162074: Download complete
Step #1: 8fbcbf53a4e0: Pull complete
Step #1: 0cefac2553f1: Pull complete
Step #1: 9497b68c874a: Pull complete
Step #1: 2a97cb3dcc4c: Pull complete
Step #1: 60b31369ad8f: Pull complete
Step #1: 5847d1847d18: Pull complete
Step #1: 8f20461fc7c2: Pull complete
Step #1: 4d82e0d035cc: Pull complete
Step #1: e8dfaee9590c: Pull complete
Step #1: c56a664ea751: Pull complete
Step #1: 99ec2a426bac: Pull complete
Step #1: f1b6a7886e7b: Pull complete
Step #1: 03d7d741b0df: Pull complete
Step #1: 1c8aca0428a7: Pull complete
Step #1: 30d0d3658364: Pull complete
Step #1: d2acd632fa33: Pull complete
Step #1: 0c2b459f8992: Pull complete
Step #1: 084e8d272547: Pull complete
Step #1: b674d1fbd06a: Pull complete
Step #1: 35903e68556a: Pull complete
Step #1: 1d54d6a00b25: Pull complete
Step #1: 4b63d9578783: Pull complete
Step #1: 5a4ef0ea8421: Pull complete
Step #1: b7a169ea6d9f: Pull complete
Step #1: 2d86793f2635: Pull complete
Step #1: 37a70280ac0f: Pull complete
Step #1: 8b82f1a02e1c: Pull complete
Step #1: 946352761910: Pull complete
Step #1: 723c135ef4a9: Pull complete
Step #1: 46f69de9c5f6: Pull complete
Step #1: 5e5e3c162074: Pull complete
Step #1: Digest: sha256:d42c2dfcf524fc5464851b045c7c4b52e2cb08bbeec1ce761a58abdc99ff1b92
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest
Step #1:  ---> 7c377ab2173e
Step #1: Step 2/7 : RUN apt-get update && apt-get install -y make autoconf automake libtool
Step #1:  ---> Running in 5373e7f9aa89
Step #1: Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease
Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB]
Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Step #1: Fetched 128 kB in 1s (122 kB/s)
Step #1: Reading package lists...
Step #1: Reading package lists...
Step #1: Building dependency tree...
Step #1: Reading state information...
Step #1: make is already the newest version (4.2.1-1.2).
Step #1: make set to manually installed.
Step #1: The following additional packages will be installed:
Step #1:   autotools-dev file libltdl-dev libltdl7 libmagic-mgc libmagic1 libsigsegv2
Step #1:   m4
Step #1: Suggested packages:
Step #1:   autoconf-archive gnu-standards autoconf-doc gettext libtool-doc gfortran
Step #1:   | fortran95-compiler gcj-jdk m4-doc
Step #1: The following NEW packages will be installed:
Step #1:   autoconf automake autotools-dev file libltdl-dev libltdl7 libmagic-mgc
Step #1:   libmagic1 libsigsegv2 libtool m4
Step #1: 0 upgraded, 11 newly installed, 0 to remove and 0 not upgraded.
Step #1: Need to get 1774 kB of archives.
Step #1: After this operation, 12.8 MB of additional disk space will be used.
Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic-mgc amd64 1:5.38-4 [218 kB]
Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal/main amd64 libmagic1 amd64 1:5.38-4 [75.9 kB]
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal/main amd64 file amd64 1:5.38-4 [23.3 kB]
Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal/main amd64 libsigsegv2 amd64 2.12-2 [13.9 kB]
Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal/main amd64 m4 amd64 1.4.18-4 [199 kB]
Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 autoconf all 2.69-11.1 [321 kB]
Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 autotools-dev all 20180224.1 [39.6 kB]
Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal/main amd64 automake all 1:1.16.1-4ubuntu6 [522 kB]
Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl7 amd64 2.4.6-14 [38.5 kB]
Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal/main amd64 libltdl-dev amd64 2.4.6-14 [162 kB]
Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal/main amd64 libtool all 2.4.6-14 [161 kB]
Step #1: debconf: delaying package configuration, since apt-utils is not installed
Step #1: Fetched 1774 kB in 1s (1512 kB/s)
Step #1: Selecting previously unselected package libmagic-mgc.
Step #1: (Reading database ... 
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 17384 files and directories currently installed.)
Step #1: Preparing to unpack .../00-libmagic-mgc_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking libmagic-mgc (1:5.38-4) ...
Step #1: Selecting previously unselected package libmagic1:amd64.
Step #1: Preparing to unpack .../01-libmagic1_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking libmagic1:amd64 (1:5.38-4) ...
Step #1: Selecting previously unselected package file.
Step #1: Preparing to unpack .../02-file_1%3a5.38-4_amd64.deb ...
Step #1: Unpacking file (1:5.38-4) ...
Step #1: Selecting previously unselected package libsigsegv2:amd64.
Step #1: Preparing to unpack .../03-libsigsegv2_2.12-2_amd64.deb ...
Step #1: Unpacking libsigsegv2:amd64 (2.12-2) ...
Step #1: Selecting previously unselected package m4.
Step #1: Preparing to unpack .../04-m4_1.4.18-4_amd64.deb ...
Step #1: Unpacking m4 (1.4.18-4) ...
Step #1: Selecting previously unselected package autoconf.
Step #1: Preparing to unpack .../05-autoconf_2.69-11.1_all.deb ...
Step #1: Unpacking autoconf (2.69-11.1) ...
Step #1: Selecting previously unselected package autotools-dev.
Step #1: Preparing to unpack .../06-autotools-dev_20180224.1_all.deb ...
Step #1: Unpacking autotools-dev (20180224.1) ...
Step #1: Selecting previously unselected package automake.
Step #1: Preparing to unpack .../07-automake_1%3a1.16.1-4ubuntu6_all.deb ...
Step #1: Unpacking automake (1:1.16.1-4ubuntu6) ...
Step #1: Selecting previously unselected package libltdl7:amd64.
Step #1: Preparing to unpack .../08-libltdl7_2.4.6-14_amd64.deb ...
Step #1: Unpacking libltdl7:amd64 (2.4.6-14) ...
Step #1: Selecting previously unselected package libltdl-dev:amd64.
Step #1: Preparing to unpack .../09-libltdl-dev_2.4.6-14_amd64.deb ...
Step #1: Unpacking libltdl-dev:amd64 (2.4.6-14) ...
Step #1: Selecting previously unselected package libtool.
Step #1: Preparing to unpack .../10-libtool_2.4.6-14_all.deb ...
Step #1: Unpacking libtool (2.4.6-14) ...
Step #1: Setting up libmagic-mgc (1:5.38-4) ...
Step #1: Setting up libmagic1:amd64 (1:5.38-4) ...
Step #1: Setting up file (1:5.38-4) ...
Step #1: Setting up autotools-dev (20180224.1) ...
Step #1: Setting up libsigsegv2:amd64 (2.12-2) ...
Step #1: Setting up libltdl7:amd64 (2.4.6-14) ...
Step #1: Setting up libtool (2.4.6-14) ...
Step #1: Setting up m4 (1.4.18-4) ...
Step #1: Setting up autoconf (2.69-11.1) ...
Step #1: Setting up automake (1:1.16.1-4ubuntu6) ...
Step #1: update-alternatives: using /usr/bin/automake-1.16 to provide /usr/bin/automake (automake) in auto mode
Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/automake.1.gz because associated file /usr/share/man/man1/automake-1.16.1.gz (of link group automake) doesn't exist
Step #1: update-alternatives: warning: skip creation of /usr/share/man/man1/aclocal.1.gz because associated file /usr/share/man/man1/aclocal-1.16.1.gz (of link group automake) doesn't exist
Step #1: Setting up libltdl-dev:amd64 (2.4.6-14) ...
Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ...
Step #1: Removing intermediate container 5373e7f9aa89
Step #1:  ---> 93f0782c7407
Step #1: Step 3/7 : RUN git clone --depth 1 https://gitlab.xiph.org/xiph/ogg.git
Step #1:  ---> Running in a0a226d0e736
Step #1: Cloning into 'ogg'...
Step #1: Removing intermediate container a0a226d0e736
Step #1:  ---> e933f6382713
Step #1: Step 4/7 : RUN git clone --depth 1 https://gitlab.xiph.org/xiph/theora.git libtheora
Step #1:  ---> Running in ab8841780fee
Step #1: Cloning into 'libtheora'...
Step #1: Removing intermediate container ab8841780fee
Step #1:  ---> c98dc08868b4
Step #1: Step 5/7 : RUN git clone --depth 1 https://github.com/guidovranken/oss-fuzz-fuzzers.git
Step #1:  ---> Running in 87745b6a6d05
Step #1: Cloning into 'oss-fuzz-fuzzers'...
Step #1: Removing intermediate container 87745b6a6d05
Step #1:  ---> 7a31a31fb8d5
Step #1: Step 6/7 : RUN git clone --depth 1 https://github.com/guidovranken/fuzzing-headers.git
Step #1:  ---> Running in 6b1af198c0b5
Step #1: Cloning into 'fuzzing-headers'...
Step #1: Removing intermediate container 6b1af198c0b5
Step #1:  ---> 008334a3e8ea
Step #1: Step 7/7 : COPY build.sh $SRC/
Step #1:  ---> 3c1971218b57
Step #1: Successfully built 3c1971218b57
Step #1: Successfully tagged gcr.io/oss-fuzz/libtheora:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/libtheora
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/fileqiOMHL
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ c++ == \g\o ]]
Step #2 - "srcmap": ++ find /src -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/fuzzing-headers/.git
Step #2 - "srcmap": + GIT_DIR=/src/fuzzing-headers
Step #2 - "srcmap": + cd /src/fuzzing-headers
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/fuzzing-headers.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=bbd75f2806d18009aeca0f3b8fdcc6e7a3929686
Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileSe65Gd
Step #2 - "srcmap": + cat /tmp/fileqiOMHL
Step #2 - "srcmap": + jq '."/src/fuzzing-headers" = { type: "git", url: "https://github.com/guidovranken/fuzzing-headers.git", rev: "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686" }'
Step #2 - "srcmap": + mv /tmp/fileSe65Gd /tmp/fileqiOMHL
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/oss-fuzz-fuzzers/.git
Step #2 - "srcmap": + GIT_DIR=/src/oss-fuzz-fuzzers
Step #2 - "srcmap": + cd /src/oss-fuzz-fuzzers
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/guidovranken/oss-fuzz-fuzzers.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=c958e929018bc3851e12535a67190d4044c23b56
Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/oss-fuzz-fuzzers" = { type: "git", url: "https://github.com/guidovranken/oss-fuzz-fuzzers.git", rev: "c958e929018bc3851e12535a67190d4044c23b56" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/file8AxAmK
Step #2 - "srcmap": + cat /tmp/fileqiOMHL
Step #2 - "srcmap": + jq '."/src/oss-fuzz-fuzzers" = { type: "git", url: "https://github.com/guidovranken/oss-fuzz-fuzzers.git", rev: "c958e929018bc3851e12535a67190d4044c23b56" }'
Step #2 - "srcmap": + mv /tmp/file8AxAmK /tmp/fileqiOMHL
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/libtheora/.git
Step #2 - "srcmap": + GIT_DIR=/src/libtheora
Step #2 - "srcmap": + cd /src/libtheora
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://gitlab.xiph.org/xiph/theora.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=7180717276af1ebc7da15c83162d6c5d6203aabf
Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/libtheora" = { type: "git", url: "https://gitlab.xiph.org/xiph/theora.git", rev: "7180717276af1ebc7da15c83162d6c5d6203aabf" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/filehTpYke
Step #2 - "srcmap": + cat /tmp/fileqiOMHL
Step #2 - "srcmap": + jq '."/src/libtheora" = { type: "git", url: "https://gitlab.xiph.org/xiph/theora.git", rev: "7180717276af1ebc7da15c83162d6c5d6203aabf" }'
Step #2 - "srcmap": + mv /tmp/filehTpYke /tmp/fileqiOMHL
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/ogg/.git
Step #2 - "srcmap": + GIT_DIR=/src/ogg
Step #2 - "srcmap": + cd /src/ogg
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://gitlab.xiph.org/xiph/ogg.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=7cf42ea17aef7bc1b7b21af70724840a96c2e7d0
Step #2 - "srcmap": + jq_inplace /tmp/fileqiOMHL '."/src/ogg" = { type: "git", url: "https://gitlab.xiph.org/xiph/ogg.git", rev: "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/fileoOTQXK
Step #2 - "srcmap": + cat /tmp/fileqiOMHL
Step #2 - "srcmap": + jq '."/src/ogg" = { type: "git", url: "https://gitlab.xiph.org/xiph/ogg.git", rev: "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0" }'
Step #2 - "srcmap": + mv /tmp/fileoOTQXK /tmp/fileqiOMHL
Step #2 - "srcmap": ++ find /src -name .svn -type d
Step #2 - "srcmap": ++ find /src -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/fileqiOMHL
Step #2 - "srcmap": + rm /tmp/fileqiOMHL
Step #2 - "srcmap": {
Step #2 - "srcmap":   "/src/fuzzing-headers": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/guidovranken/fuzzing-headers.git",
Step #2 - "srcmap":     "rev": "bbd75f2806d18009aeca0f3b8fdcc6e7a3929686"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/oss-fuzz-fuzzers": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://github.com/guidovranken/oss-fuzz-fuzzers.git",
Step #2 - "srcmap":     "rev": "c958e929018bc3851e12535a67190d4044c23b56"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/libtheora": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://gitlab.xiph.org/xiph/theora.git",
Step #2 - "srcmap":     "rev": "7180717276af1ebc7da15c83162d6c5d6203aabf"
Step #2 - "srcmap":   },
Step #2 - "srcmap":   "/src/ogg": {
Step #2 - "srcmap":     "type": "git",
Step #2 - "srcmap":     "url": "https://gitlab.xiph.org/xiph/ogg.git",
Step #2 - "srcmap":     "rev": "7cf42ea17aef7bc1b7b21af70724840a96c2e7d0"
Step #2 - "srcmap":   }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a...  done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=address* ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=memory* ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir /src/libogg-install/
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/ogg
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh
Step #3 - "compile-libfuzzer-coverage-x86_64": Updating build configuration files for libogg, please wait....
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'.
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file './ltmain.sh'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'.
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/libtool.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltoptions.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltsugar.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/ltversion.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: copying file 'm4/lt~obsolete.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './compile'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './config.guess'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:5: installing './config.sub'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './install-sh'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './missing'
Step #3 - "compile-libfuzzer-coverage-x86_64": src/Makefile.am: installing './depcomp'
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --prefix=/src/libogg-install --enable-static --disable-shared --disable-crc
Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu
Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... 
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B
Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk
Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style)
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for an ANSI C-conforming const... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int16_t... 2
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint16_t... 2
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of u_int16_t... 2
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int32_t... 4
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint32_t... 4
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of u_int32_t... 4
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int64_t... 8
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of uint64_t... 8
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of short... 2
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of int... 4
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long... 8
Step #3 - "compile-libfuzzer-coverage-x86_64": checking size of long long... 8
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for working memcmp... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done
Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating src/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/libogg/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/ogg/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/ogg/config_types.h
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libogg.spec
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating ogg.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating ogg-uninstalled.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc
Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32
Step #3 - "compile-libfuzzer-coverage-x86_64": make  all-recursive
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in src
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I..  -I../include -I../include  -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT test_bitwise-bitwise.o -MD -MP -MF .deps/test_bitwise-bitwise.Tpo -c -o test_bitwise-bitwise.o `test -f 'bitwise.c' || echo './'`bitwise.c
Step #3 - "compile-libfuzzer-coverage-x86_64": clang -DHAVE_CONFIG_H -I. -I..  -I../include -I../include  -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT test_framing-framing.o -MD -MP -MF .deps/test_framing-framing.Tpo -c -o test_framing-framing.o `test -f 'framing.c' || echo './'`framing.c
Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool  --tag=CC   --mode=compile clang -DHAVE_CONFIG_H -I. -I..  -I../include -I../include   -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT framing.lo -MD -MP -MF .deps/framing.Tpo -c -o framing.lo framing.c
Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool  --tag=CC   --mode=compile clang -DHAVE_CONFIG_H -I. -I..  -I../include -I../include   -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT bitwise.lo -MD -MP -MF .deps/bitwise.Tpo -c -o bitwise.lo bitwise.c
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile:  clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT framing.lo -MD -MP -MF .deps/framing.Tpo -c framing.c -o framing.o
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: compile:  clang -DHAVE_CONFIG_H -I. -I.. -I../include -I../include -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -MT bitwise.lo -MD -MP -MF .deps/bitwise.Tpo -c bitwise.c -o bitwise.o
Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/bitwise.Tpo .deps/bitwise.Plo
Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/framing.Tpo .deps/framing.Plo
Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool  --tag=CC   --mode=link clang  -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -no-undefined -version-info 8:5:8  -o libogg.la -rpath /src/libogg-install/lib framing.lo bitwise.lo  
Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/test_bitwise-bitwise.Tpo .deps/test_bitwise-bitwise.Po
Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool  --tag=CC   --mode=link clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument   -o test_bitwise test_bitwise-bitwise.o  
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ar cr .libs/libogg.a  framing.o bitwise.o
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ranlib .libs/libogg.a
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: ( cd ".libs" && rm -f "libogg.la" && ln -s "../libogg.la" "libogg.la" )
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_bitwise test_bitwise-bitwise.o  -pthread
Step #3 - "compile-libfuzzer-coverage-x86_64": mv -f .deps/test_framing-framing.Tpo .deps/test_framing-framing.Po
Step #3 - "compile-libfuzzer-coverage-x86_64": /bin/bash ../libtool  --tag=CC   --mode=link clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument   -o test_framing test_framing-framing.o  
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: link: clang -D_V_SELFTEST -O2 -Wall -ffast-math -fsigned-char -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -o test_framing test_framing-framing.o  -pthread
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in ogg
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in libogg
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": + make install
Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in src
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /bin/bash ../libtool   --mode=install /usr/bin/install -c   libogg.la '/src/libogg-install/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libogg.lai /src/libogg-install/lib/libogg.la
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: /usr/bin/install -c .libs/libogg.a /src/libogg-install/lib/libogg.a
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: chmod 644 /src/libogg-install/lib/libogg.a
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: install: ranlib /src/libogg-install/lib/libogg.a
Step #3 - "compile-libfuzzer-coverage-x86_64": libtool: finish: PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/out:/sbin" ldconfig -n /src/libogg-install/lib
Step #3 - "compile-libfuzzer-coverage-x86_64": ----------------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": Libraries have been installed in:
Step #3 - "compile-libfuzzer-coverage-x86_64":    /src/libogg-install/lib
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": If you ever happen to want to link against installed libraries
Step #3 - "compile-libfuzzer-coverage-x86_64": in a given directory, LIBDIR, you must either use libtool, and
Step #3 - "compile-libfuzzer-coverage-x86_64": specify the full pathname of the library, or use the '-LLIBDIR'
Step #3 - "compile-libfuzzer-coverage-x86_64": flag during linking and do at least one of the following:
Step #3 - "compile-libfuzzer-coverage-x86_64":    - add LIBDIR to the 'LD_LIBRARY_PATH' environment variable
Step #3 - "compile-libfuzzer-coverage-x86_64":      during execution
Step #3 - "compile-libfuzzer-coverage-x86_64":    - add LIBDIR to the 'LD_RUN_PATH' environment variable
Step #3 - "compile-libfuzzer-coverage-x86_64":      during linking
Step #3 - "compile-libfuzzer-coverage-x86_64":    - use the '-Wl,-rpath -Wl,LIBDIR' linker flag
Step #3 - "compile-libfuzzer-coverage-x86_64":    - have your system administrator add LIBDIR to '/etc/ld.so.conf'
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": See any operating system documentation about shared libraries for
Step #3 - "compile-libfuzzer-coverage-x86_64": more information, such as the ld(1) and ld.so(8) manual pages.
Step #3 - "compile-libfuzzer-coverage-x86_64": ----------------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-data-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/src'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in include
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in ogg
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 config_types.h '/src/libogg-install/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 ogg.h os_types.h '/src/libogg-install/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-data-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in doc
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making install in libogg
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/share/doc/libogg/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 bitpacking.html datastructures.html decoding.html encoding.html general.html index.html ogg_iovec_t.html ogg_packet.html ogg_packet_clear.html ogg_page.html ogg_page_bos.html ogg_page_checksum_set.html ogg_page_continued.html ogg_page_eos.html ogg_page_granulepos.html ogg_page_packets.html ogg_page_pageno.html ogg_page_serialno.html ogg_page_version.html ogg_stream_check.html ogg_stream_clear.html ogg_stream_destroy.html ogg_stream_eos.html ogg_stream_flush.html ogg_stream_flush_fill.html ogg_stream_init.html ogg_stream_iovecin.html ogg_stream_packetin.html ogg_stream_packetout.html ogg_stream_packetpeek.html ogg_stream_pagein.html ogg_stream_pageout.html ogg_stream_pageout_fill.html ogg_stream_reset.html ogg_stream_reset_serialno.html ogg_stream_state.html ogg_sync_buffer.html ogg_sync_check.html ogg_sync_clear.html ogg_sync_destroy.html '/src/libogg-install/share/doc/libogg/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 ogg_sync_init.html ogg_sync_pageout.html ogg_sync_pageseek.html ogg_sync_reset.html ogg_sync_state.html ogg_sync_wrote.html oggpack_adv.html oggpack_adv1.html oggpack_bits.html oggpack_buffer.html oggpack_bytes.html oggpack_get_buffer.html oggpack_look.html oggpack_look1.html oggpack_read.html oggpack_read1.html oggpack_readinit.html oggpack_reset.html oggpack_write.html oggpack_writealign.html oggpack_writecheck.html oggpack_writeclear.html oggpack_writecopy.html oggpack_writeinit.html oggpack_writetrunc.html overview.html reference.html style.css '/src/libogg-install/share/doc/libogg/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'install-exec-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/share/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 framing.html index.html oggstream.html ogg-multiplex.html fish_xiph_org.png multiplex1.png packets.png pages.png stream.png vorbisword2.png white-ogg.png white-xifish.png rfc3533.txt rfc5334.txt skeleton.html '/src/libogg-install/share/doc/libogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'install-exec-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/share/aclocal'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 ogg.m4 '/src/libogg-install/share/aclocal'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/mkdir -p '/src/libogg-install/lib/pkgconfig'
Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/bin/install -c -m 644 ogg.pc '/src/libogg-install/lib/pkgconfig'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/ogg'
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/fuzzing-headers/
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./install.sh
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/libtheora/
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./autogen.sh
Step #3 - "compile-libfuzzer-coverage-x86_64": Updating build configuration files, please wait....
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting auxiliary files in '.'.
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file './ltmain.sh'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: putting macros in AC_CONFIG_MACRO_DIRS, 'm4'.
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/libtool.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltoptions.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltsugar.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/ltversion.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": libtoolize: linking file 'm4/lt~obsolete.m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:56: installing './compile'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.guess'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:9: installing './config.sub'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:12: installing './install-sh'
Step #3 - "compile-libfuzzer-coverage-x86_64": configure.ac:12: installing './missing'
Step #3 - "compile-libfuzzer-coverage-x86_64": doc/spec/Makefile.am: installing './depcomp'
Step #3 - "compile-libfuzzer-coverage-x86_64": lib/Makefile.am:304: warning: '%'-style pattern rules are a GNU make extension
Step #3 - "compile-libfuzzer-coverage-x86_64": parallel-tests: installing './test-driver'
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *sanitize=memory* ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + [[ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION  -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument = *-m32* ]]
Step #3 - "compile-libfuzzer-coverage-x86_64": + LD_LIBRARY_PATH=/src/libogg-install/lib
Step #3 - "compile-libfuzzer-coverage-x86_64": + ./configure --with-ogg=/src/libogg-install --disable-encode --disable-examples --enable-static --disable-shared
Step #3 - "compile-libfuzzer-coverage-x86_64": checking build system type... x86_64-pc-linux-gnu
Step #3 - "compile-libfuzzer-coverage-x86_64": checking host system type... x86_64-pc-linux-gnu
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a BSD-compatible install... /usr/bin/install -c
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether build environment is sane... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a thread-safe mkdir -p... /usr/bin/mkdir -p
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gawk... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mawk... mawk
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make sets $(MAKE)... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to enable maintainer-specific portions of Makefiles... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports nested variables... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether make supports the include directive... yes (GNU style)
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... clang
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the C compiler works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for C compiler default output file name... a.out
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of executables... 
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are cross compiling... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for suffix of object files... o
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... none needed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... gcc3
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for gcc... (cached) clang
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether we are using the GNU C compiler... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang accepts -g... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to accept ISO C89... (cached) none needed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether clang understands -c and -o together... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dependency style of clang... (cached) gcc3
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to run the C preprocessor... clang -E
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to print strings... printf
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a sed that does not truncate output... /usr/bin/sed
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for grep that handles long lines and -e... /usr/bin/grep
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for egrep... /usr/bin/grep -E
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fgrep... /usr/bin/grep -F
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... /usr/bin/ld
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for BSD- or MS-compatible name lister (nm)... /usr/bin/nm -B
Step #3 - "compile-libfuzzer-coverage-x86_64": checking the name lister (/usr/bin/nm -B) interface... BSD nm
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether ln -s works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking the maximum length of command line arguments... 1572864
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to x86_64-pc-linux-gnu format... func_convert_file_noop
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to convert x86_64-pc-linux-gnu file names to toolchain format... func_convert_file_noop
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for /usr/bin/ld option to reload object files... -r
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdump... objdump
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to recognize dependent libraries... pass_all
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlltool... dlltool
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to associate runtime and link libraries... printf %s\n
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ar... ar
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for archiver @FILE support... @
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strip... strip
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ranlib... ranlib
Step #3 - "compile-libfuzzer-coverage-x86_64": checking command to parse /usr/bin/nm -B output from clang object... ok
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sysroot... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for a working dd... /usr/bin/dd
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to truncate binary pipes... /usr/bin/dd bs=4096 count=1
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for mt... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if : is a manifest tool... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ANSI C header files... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/types.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/stat.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdlib.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for string.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for memory.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for strings.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for inttypes.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for stdint.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for unistd.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for dlfcn.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for objdir... .libs
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -fno-rtti -fno-exceptions... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for clang option to produce PIC... -fPIC -DPIC
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang PIC flag -fPIC -DPIC works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang static flag -static works... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if clang supports -c -o file.o... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether the clang linker (/usr/bin/ld -m elf_x86_64) supports shared libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking dynamic linker characteristics... GNU/Linux ld.so
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to hardcode library paths into programs... immediate
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether stripping libraries is possible... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if libtool supports shared libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build shared libraries... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking whether to build static libraries... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for doxygen... false
Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: *** doxygen not found, API documentation will not be built
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pdflatex... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for bibtex... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for fig2dev... no
Step #3 - "compile-libfuzzer-coverage-x86_64": configure: Checking for packages in ./doc/spec/spec.tex...
Step #3 - "compile-libfuzzer-coverage-x86_64": configure: WARNING: *** Format Specification will not built.
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ld used by clang... (cached) /usr/bin/ld
Step #3 - "compile-libfuzzer-coverage-x86_64": checking if the linker (/usr/bin/ld) is GNU ld... (cached) yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking how to control symbol export... --version-script
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for pkg-config... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Ogg... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for oggpackB_read... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for Vorbis... no
Step #3 - "compile-libfuzzer-coverage-x86_64": *** Could not run Vorbis test program, checking why...
Step #3 - "compile-libfuzzer-coverage-x86_64": *** The test program failed to compile or link. See the file config.log for the
Step #3 - "compile-libfuzzer-coverage-x86_64": *** exact error that occured. This usually means Vorbis was incorrectly installed
Step #3 - "compile-libfuzzer-coverage-x86_64": *** or that you have moved Vorbis since it was installed.
Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/soundcard.h usability... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking sys/soundcard.h presence... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for sys/soundcard.h... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for TIFFReadRGBAImage in -ltiff... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for ftime in -lcompat... no
Step #3 - "compile-libfuzzer-coverage-x86_64": checking for getopt_long... yes
Step #3 - "compile-libfuzzer-coverage-x86_64": checking that generated files are newer than configure... done
Step #3 - "compile-libfuzzer-coverage-x86_64": configure: creating ./config.status
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lib/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating lib/arm/armopts.s
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating include/theora/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating examples/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/Doxyfile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating doc/spec/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating tests/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating m4/Makefile
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating libtheora.spec
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theora.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theora-uninstalled.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoradec.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoradec-uninstalled.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoraenc.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating theoraenc-uninstalled.pc
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: creating config.h
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing depfiles commands
Step #3 - "compile-libfuzzer-coverage-x86_64": config.status: executing libtool commands
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": ------------------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64":   libtheora 1.2.0alpha1+git:  Automatic configuration OK.
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":   General configuration:
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":     Encoding support: ........... no
Step #3 - "compile-libfuzzer-coverage-x86_64":     Assembly optimization: ...... 64 bit x86
Step #3 - "compile-libfuzzer-coverage-x86_64":     Debugging telemetry: ........ no
Step #3 - "compile-libfuzzer-coverage-x86_64":     Abort on huge files: ........ no
Step #3 - "compile-libfuzzer-coverage-x86_64":     Build example code: ......... no
Step #3 - "compile-libfuzzer-coverage-x86_64":     API Documentation: .......... no
Step #3 - "compile-libfuzzer-coverage-x86_64":     Format Documentation: ....... no
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":   Installation paths:
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":     libtheora: ................... /usr/local/lib
Step #3 - "compile-libfuzzer-coverage-x86_64":     C header files: .............. /usr/local/include/theora
Step #3 - "compile-libfuzzer-coverage-x86_64":     Documentation: ............... /usr/local/share/doc/libtheora
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":   Building:
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":     Type 'make' to compile libtheora.
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":     Type 'make install' to install libtheora.
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":     Type 'make check' to run test suite (Valgrind testing not enabled)
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64":   Example programs will be built but not installed.
Step #3 - "compile-libfuzzer-coverage-x86_64": ------------------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": 
Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc
Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32
Step #3 - "compile-libfuzzer-coverage-x86_64": make  all-recursive
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Entering directory '/src/libtheora'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in lib
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64": make  all-am
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       apiwrapper.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       bitpack.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       decapiwrapper.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       decinfo.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       decode.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       dequant.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       huffdec.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       fragment.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       idct.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       info.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       internal.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       quant.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       state.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       encoder_disabled.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/x86cpu.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/mmxidct.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/mmxfrag.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/mmxstate.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/sse2idct.lo
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       x86/x86state.lo
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:195:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   195 |   OC_DCT_CW_PACK( 0,10, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:198:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   198 |   OC_DCT_CW_PACK( 0, 0,  0,1),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:208:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   208 |   OC_DCT_CW_PACK( 0, 1, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:210:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   210 |   OC_DCT_CW_PACK( 0, 2, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:212:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   212 |   OC_DCT_CW_PACK( 0, 3, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:214:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   214 |   OC_DCT_CW_PACK( 0, 4, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:216:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   216 |   OC_DCT_CW_PACK( 0, 5, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:220:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   220 |   OC_DCT_CW_PACK( 0, 1, -2,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:221:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   221 |   OC_DCT_CW_PACK( 0, 1, -3,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:227:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   227 |   OC_DCT_CW_PACK( 0, 6, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:228:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   228 |   OC_DCT_CW_PACK( 0, 7, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:229:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   229 |   OC_DCT_CW_PACK( 0, 8, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:230:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   230 |   OC_DCT_CW_PACK( 0, 9, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:236:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   236 |   OC_DCT_CW_PACK( 0, 2, -2,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:237:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   237 |   OC_DCT_CW_PACK( 0, 3, -2,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:238:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   238 |   OC_DCT_CW_PACK( 0, 2, -3,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:239:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   239 |   OC_DCT_CW_PACK( 0, 3, -3,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:242:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   242 |   OC_DCT_CW_PACK( 0, 0,  0,1),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:253:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   253 |   OC_DCT_CW_PACK( 0, 0, -1,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:257:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   257 |   OC_DCT_CW_PACK( 0, 0, -2,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:260:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   260 |   OC_DCT_CW_PACK( 0, 0, -3,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:262:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   262 |   OC_DCT_CW_PACK( 0, 0, -4,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:264:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   264 |   OC_DCT_CW_PACK( 0, 0, -5,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:266:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   266 |   OC_DCT_CW_PACK( 0, 0, -6,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:270:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   270 |   OC_DCT_CW_PACK( 0, 0, -7,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:271:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   271 |   OC_DCT_CW_PACK( 0, 0, -8,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:277:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   277 |   OC_DCT_CW_PACK( 0, 0, -9,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:278:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   278 |   OC_DCT_CW_PACK( 0, 0,-10,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:279:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   279 |   OC_DCT_CW_PACK( 0, 0,-11,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:280:3: warning: shifting a negative signed value is undefined [-Wshift-negative-value]
Step #3 - "compile-libfuzzer-coverage-x86_64":   280 |   OC_DCT_CW_PACK( 0, 0,-12,0),
Step #3 - "compile-libfuzzer-coverage-x86_64":       |   ^~~~~~~~~~~~~~~~~~~~~~~~~~~
Step #3 - "compile-libfuzzer-coverage-x86_64": decode.c:150:16: note: expanded from macro 'OC_DCT_CW_PACK'
Step #3 - "compile-libfuzzer-coverage-x86_64":   150 |  (_mag)-(_flip)<<OC_DCT_CW_MAG_SHIFT)
Step #3 - "compile-libfuzzer-coverage-x86_64":       |  ~~~~~~~~~~~~~~^
Step #3 - "compile-libfuzzer-coverage-x86_64": huffdec.c:439:7: warning: variable 'total' set but not used [-Wunused-but-set-variable]
Step #3 - "compile-libfuzzer-coverage-x86_64":   439 |   int total;
Step #3 - "compile-libfuzzer-coverage-x86_64":       |       ^
Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated.
Step #3 - "compile-libfuzzer-coverage-x86_64": 30 warnings generated.
Step #3 - "compile-libfuzzer-coverage-x86_64":   CCLD     libtheoradec.la
Step #3 - "compile-libfuzzer-coverage-x86_64":   CCLD     libtheora.la
Step #3 - "compile-libfuzzer-coverage-x86_64":   CCLD     libtheoraenc.la
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/lib'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in include
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in theora
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/include/theora'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/include/theora'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Nothing to be done for 'all-am'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/include'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in doc
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in spec
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/doc/spec'
Step #3 - "compile-libfuzzer-coverage-x86_64":   CC       vp3huff.o
Step #3 - "compile-libfuzzer-coverage-x86_64":   CCLD     vp3huff
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/doc/spec'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Entering directory '/src/libtheora/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": echo "*** Warning: Doxygen not found; documentation will not be built."
Step #3 - "compile-libfuzzer-coverage-x86_64": *** Warning: Doxygen not found; documentation will not be built.
Step #3 - "compile-libfuzzer-coverage-x86_64": touch doxygen-build.stamp
Step #3 - "compile-libfuzzer-coverage-x86_64": make[3]: Leaving directory '/src/libtheora/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/doc'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in tests
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/tests'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/tests'
Step #3 - "compile-libfuzzer-coverage-x86_64": Making all in m4
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora/m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Nothing to be done for 'all'.
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora/m4'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Entering directory '/src/libtheora'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[2]: Leaving directory '/src/libtheora'
Step #3 - "compile-libfuzzer-coverage-x86_64": make[1]: Leaving directory '/src/libtheora'
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /src/oss-fuzz-fuzzers/libtheora/
Step #3 - "compile-libfuzzer-coverage-x86_64": + clang++ -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -I /src/libtheora/include/ -I /src/libogg-install/include fuzzer.cpp /src/libtheora/lib/.libs/libtheora.a -fsanitize=fuzzer -o /workspace/out/libfuzzer-coverage-x86_64/fuzzer-decoder
Finished Step #3 - "compile-libfuzzer-coverage-x86_64"
Starting Step #4
Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner
Step #4: Using default tag: latest
Step #4: latest: Pulling from oss-fuzz-base/base-runner
Step #4: b549f31133a9: Already exists
Step #4: 8fbcbf53a4e0: Already exists
Step #4: 0cefac2553f1: Already exists
Step #4: ee0bd9a22eea: Pulling fs layer
Step #4: 130d25f83adf: Pulling fs layer
Step #4: f0264da68732: Pulling fs layer
Step #4: 5814f959d749: Pulling fs layer
Step #4: 7ead214ec6f8: Pulling fs layer
Step #4: 1bb2940da840: Pulling fs layer
Step #4: e19785e9b2c6: Pulling fs layer
Step #4: 7b0133017c68: Pulling fs layer
Step #4: 00bfbd2ee689: Pulling fs layer
Step #4: c3db59c793f3: Pulling fs layer
Step #4: d086feb0d1ad: Pulling fs layer
Step #4: 985b0d452b72: Pulling fs layer
Step #4: 4f8d69fba4e3: Pulling fs layer
Step #4: 2832d7575ad0: Pulling fs layer
Step #4: c9ccffaa82c8: Pulling fs layer
Step #4: 4e3f7874f902: Pulling fs layer
Step #4: 6961b38d59d4: Pulling fs layer
Step #4: 00bfbd2ee689: Waiting
Step #4: 7ead214ec6f8: Waiting
Step #4: c3db59c793f3: Waiting
Step #4: d086feb0d1ad: Waiting
Step #4: 1bb2940da840: Waiting
Step #4: 985b0d452b72: Waiting
Step #4: e19785e9b2c6: Waiting
Step #4: 4f8d69fba4e3: Waiting
Step #4: 7b0133017c68: Waiting
Step #4: 2832d7575ad0: Waiting
Step #4: 6961b38d59d4: Waiting
Step #4: c9ccffaa82c8: Waiting
Step #4: 4e3f7874f902: Waiting
Step #4: 5814f959d749: Waiting
Step #4: f0264da68732: Download complete
Step #4: ee0bd9a22eea: Verifying Checksum
Step #4: 130d25f83adf: Verifying Checksum
Step #4: 130d25f83adf: Download complete
Step #4: ee0bd9a22eea: Pull complete
Step #4: 1bb2940da840: Verifying Checksum
Step #4: 1bb2940da840: Download complete
Step #4: e19785e9b2c6: Verifying Checksum
Step #4: e19785e9b2c6: Download complete
Step #4: 130d25f83adf: Pull complete
Step #4: 7ead214ec6f8: Verifying Checksum
Step #4: 7ead214ec6f8: Download complete
Step #4: f0264da68732: Pull complete
Step #4: 00bfbd2ee689: Verifying Checksum
Step #4: 00bfbd2ee689: Download complete
Step #4: 7b0133017c68: Verifying Checksum
Step #4: 7b0133017c68: Download complete
Step #4: 5814f959d749: Verifying Checksum
Step #4: 5814f959d749: Download complete
Step #4: d086feb0d1ad: Verifying Checksum
Step #4: d086feb0d1ad: Download complete
Step #4: 985b0d452b72: Verifying Checksum
Step #4: 985b0d452b72: Download complete
Step #4: 4f8d69fba4e3: Verifying Checksum
Step #4: 4f8d69fba4e3: Download complete
Step #4: 2832d7575ad0: Verifying Checksum
Step #4: 2832d7575ad0: Download complete
Step #4: c9ccffaa82c8: Download complete
Step #4: 4e3f7874f902: Download complete
Step #4: c3db59c793f3: Verifying Checksum
Step #4: c3db59c793f3: Download complete
Step #4: 6961b38d59d4: Verifying Checksum
Step #4: 6961b38d59d4: Download complete
Step #4: 5814f959d749: Pull complete
Step #4: 7ead214ec6f8: Pull complete
Step #4: 1bb2940da840: Pull complete
Step #4: e19785e9b2c6: Pull complete
Step #4: 7b0133017c68: Pull complete
Step #4: 00bfbd2ee689: Pull complete
Step #4: c3db59c793f3: Pull complete
Step #4: d086feb0d1ad: Pull complete
Step #4: 985b0d452b72: Pull complete
Step #4: 4f8d69fba4e3: Pull complete
Step #4: 2832d7575ad0: Pull complete
Step #4: c9ccffaa82c8: Pull complete
Step #4: 4e3f7874f902: Pull complete
Step #4: 6961b38d59d4: Pull complete
Step #4: Digest: sha256:a7e4071f89ac8faa29e6011d41f34814d55cc50247e64438a27275243b7c2a62
Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest
Step #4: gcr.io/oss-fuzz-base/base-runner:latest
Finished Step #4
Starting Step #5
Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner
Step #5: Running fuzzer-decoder
Step #5: [2024-09-20 06:21:27,091 INFO] Finding shared libraries for targets (if any).
Step #5: [2024-09-20 06:21:27,101 INFO] Finished finding shared libraries for targets.
Step #5: [2024-09-20 06:21:27,242 INFO] Finding shared libraries for targets (if any).
Step #5: [2024-09-20 06:21:27,252 INFO] Finished finding shared libraries for targets.
Step #5: [2024-09-20 06:21:27,394 DEBUG] Finished generating per-file code coverage summary.
Step #5: [2024-09-20 06:21:27,394 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html".
Step #5: [2024-09-20 06:21:27,408 DEBUG] Finished generating file view html index file.
Step #5: [2024-09-20 06:21:27,408 DEBUG] Calculating per-directory coverage summary.
Step #5: [2024-09-20 06:21:27,408 DEBUG] Finished calculating per-directory coverage summary.
Step #5: [2024-09-20 06:21:27,408 DEBUG] Writing per-directory coverage html reports.
Step #5: [2024-09-20 06:21:27,481 DEBUG] Finished writing per-directory coverage html reports.
Step #5: [2024-09-20 06:21:27,481 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html".
Step #5: [2024-09-20 06:21:27,481 DEBUG] Finished generating directory view html index file.
Step #5: [2024-09-20 06:21:27,481 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html".
Step #5: [2024-09-20 06:21:27,624 DEBUG] Finished generating per-file code coverage summary.
Step #5: [2024-09-20 06:21:27,624 DEBUG] Generating file view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/file_view_index.html".
Step #5: [2024-09-20 06:21:27,638 DEBUG] Finished generating file view html index file.
Step #5: [2024-09-20 06:21:27,638 DEBUG] Calculating per-directory coverage summary.
Step #5: [2024-09-20 06:21:27,638 DEBUG] Finished calculating per-directory coverage summary.
Step #5: [2024-09-20 06:21:27,638 DEBUG] Writing per-directory coverage html reports.
Step #5: [2024-09-20 06:21:27,712 DEBUG] Finished writing per-directory coverage html reports.
Step #5: [2024-09-20 06:21:27,712 DEBUG] Generating directory view html index file as: "/workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/directory_view_index.html".
Step #5: [2024-09-20 06:21:27,712 DEBUG] Finished generating directory view html index file.
Step #5: [2024-09-20 06:21:27,712 INFO] Index file for html report is generated as: "file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/index.html".
Finished Step #5
Starting Step #6
Step #6: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #6: CommandException: 1 files/objects could not be removed.
Finished Step #6
Starting Step #7
Step #7: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/style.css [Content-Type=text/css]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/summary.json [Content-Type=application/json]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/directory_view_index.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/file_view_index.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/report.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/index.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/report.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libogg-install/include/ogg/os_types.h.html [Content-Type=text/html]...
Step #7: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/report.html [Content-Type=text/html]...
Step #7: / [0/40 files][  2.5 KiB/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/libtheora/fuzzer.cpp.html [Content-Type=text/html]...
Step #7: / [0/40 files][  2.5 KiB/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/huffman.h.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/oss-fuzz-fuzzers/libtheora/report.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/report.html [Content-Type=text/html]...
Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/theora.h.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/theoradec.h.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
/ [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decode.c.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/state.c.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/huffdec.c.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/quant.c.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/state.h.html [Content-Type=text/html]...
Step #7: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
/ [1/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/include/theora/codec.h.html [Content-Type=text/html]...
Step #7: / [1/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
/ [2/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/bitpack.h.html [Content-Type=text/html]...
Step #7: / [2/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/internal.c.html [Content-Type=text/html]...
Step #7: / [2/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decint.h.html [Content-Type=text/html]...
Step #7: / [2/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/decinfo.c.html [Content-Type=text/html]...
Step #7: / [2/40 files][ 45.7 KiB/  2.1 MiB]   2% Done                                   
/ [3/40 files][ 73.6 KiB/  2.1 MiB]   3% Done                                   
/ [4/40 files][ 73.6 KiB/  2.1 MiB]   3% Done                                   
/ [5/40 files][ 73.6 KiB/  2.1 MiB]   3% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/bitpack.c.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/report.html [Content-Type=text/html]...
Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/dequant.c.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
/ [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/internal.h.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/ocintrin.h.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/info.c.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86cpu.h.html [Content-Type=text/html]...
Step #7: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86state.c.html [Content-Type=text/html]...
Step #7: / [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
/ [5/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
/ [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86cpu.c.html [Content-Type=text/html]...
Step #7: / [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/x86int.h.html [Content-Type=text/html]...
Step #7: / [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxfrag.c.html [Content-Type=text/html]...
Step #7: / [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/report.html [Content-Type=text/html]...
Step #7: / [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxloop.h.html [Content-Type=text/html]...
Step #7: / [6/40 files][115.5 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/sse2idct.c.html [Content-Type=text/html]...
Step #7: / [6/40 files][119.8 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report/linux/src/libtheora/lib/x86/mmxstate.c.html [Content-Type=text/html]...
Step #7: / [6/40 files][119.8 KiB/  2.1 MiB]   5% Done                                   
/ [7/40 files][124.1 KiB/  2.1 MiB]   5% Done                                   
/ [8/40 files][124.1 KiB/  2.1 MiB]   5% Done                                   
/ [9/40 files][124.1 KiB/  2.1 MiB]   5% Done                                   
/ [10/40 files][124.1 KiB/  2.1 MiB]   5% Done                                  
/ [11/40 files][124.1 KiB/  2.1 MiB]   5% Done                                  
/ [12/40 files][562.5 KiB/  2.1 MiB]  26% Done                                  
/ [13/40 files][562.5 KiB/  2.1 MiB]  26% Done                                  
/ [14/40 files][  1.2 MiB/  2.1 MiB]  57% Done                                  
/ [15/40 files][  1.3 MiB/  2.1 MiB]  60% Done                                  
/ [16/40 files][  1.3 MiB/  2.1 MiB]  60% Done                                  
/ [17/40 files][  1.3 MiB/  2.1 MiB]  60% Done                                  
/ [18/40 files][  1.3 MiB/  2.1 MiB]  62% Done                                  
/ [19/40 files][  1.4 MiB/  2.1 MiB]  64% Done                                  
-
- [20/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
- [21/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [22/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [23/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [24/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [25/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [26/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [27/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [28/40 files][  1.4 MiB/  2.1 MiB]  68% Done                                  
- [29/40 files][  1.6 MiB/  2.1 MiB]  77% Done                                  
- [30/40 files][  1.6 MiB/  2.1 MiB]  77% Done                                  
- [31/40 files][  1.6 MiB/  2.1 MiB]  77% Done                                  
- [32/40 files][  1.6 MiB/  2.1 MiB]  77% Done                                  
- [33/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [34/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [35/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [36/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [37/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [38/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [39/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [40/40 files][  2.1 MiB/  2.1 MiB] 100% Done                                  
Step #7: Operation completed over 40 objects/2.1 MiB.                                     
Finished Step #7
Starting Step #8
Step #8: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #8: CommandException: 1 files/objects could not be removed.
Finished Step #8
Starting Step #9
Step #9: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/style.css [Content-Type=text/css]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/summary.json [Content-Type=application/json]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/directory_view_index.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/file_view_index.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/report.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/index.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/report.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/report.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/libtheora/fuzzer.cpp.html [Content-Type=text/html]...
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libogg-install/include/ogg/os_types.h.html [Content-Type=text/html]...
Step #9: / [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
/ [0/40 files][    0.0 B/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/oss-fuzz-fuzzers/libtheora/report.html [Content-Type=text/html]...
Step #9: / [0/40 files][ 12.8 KiB/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/report.html [Content-Type=text/html]...
Step #9: / [0/40 files][ 12.8 KiB/  2.1 MiB]   0% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/theora.h.html [Content-Type=text/html]...
Step #9: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/theoradec.h.html [Content-Type=text/html]...
Step #9: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/include/theora/codec.h.html [Content-Type=text/html]...
Step #9: / [0/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
/ [1/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/huffman.h.html [Content-Type=text/html]...
Step #9: / [1/40 files][ 27.9 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/huffdec.c.html [Content-Type=text/html]...
Step #9: / [1/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decode.c.html [Content-Type=text/html]...
Step #9: / [1/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
/ [2/40 files][ 28.1 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/state.c.html [Content-Type=text/html]...
Step #9: / [2/40 files][ 32.4 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/quant.c.html [Content-Type=text/html]...
Step #9: / [2/40 files][ 32.4 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/bitpack.h.html [Content-Type=text/html]...
Step #9: / [2/40 files][ 37.2 KiB/  2.1 MiB]   1% Done                                   
/ [3/40 files][ 41.5 KiB/  2.1 MiB]   1% Done                                   
/ [4/40 files][ 41.5 KiB/  2.1 MiB]   1% Done                                   
/ [5/40 files][ 41.5 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/internal.c.html [Content-Type=text/html]...
Step #9: / [5/40 files][ 41.5 KiB/  2.1 MiB]   1% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decint.h.html [Content-Type=text/html]...
Step #9: / [5/40 files][106.9 KiB/  2.1 MiB]   4% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/state.h.html [Content-Type=text/html]...
Step #9: / [5/40 files][106.9 KiB/  2.1 MiB]   4% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/decinfo.c.html [Content-Type=text/html]...
Step #9: / [5/40 files][124.1 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/bitpack.c.html [Content-Type=text/html]...
Step #9: / [5/40 files][124.1 KiB/  2.1 MiB]   5% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/report.html [Content-Type=text/html]...
Step #9: / [5/40 files][271.4 KiB/  2.1 MiB]  12% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/dequant.c.html [Content-Type=text/html]...
Step #9: / [6/40 files][336.0 KiB/  2.1 MiB]  15% Done                                   
/ [6/40 files][336.0 KiB/  2.1 MiB]  15% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/internal.h.html [Content-Type=text/html]...
Step #9: / [6/40 files][546.0 KiB/  2.1 MiB]  25% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/info.c.html [Content-Type=text/html]...
Step #9: / [6/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/ocintrin.h.html [Content-Type=text/html]...
Step #9: / [6/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86state.c.html [Content-Type=text/html]...
Step #9: / [6/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86cpu.h.html [Content-Type=text/html]...
Step #9: / [6/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86int.h.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
/ [7/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/x86cpu.c.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.1 MiB/  2.1 MiB]  52% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxfrag.c.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/report.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxloop.h.html [Content-Type=text/html]...
Step #9: Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/sse2idct.c.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
/ [7/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
Copying file:///workspace/out/libfuzzer-coverage-x86_64/report_target/fuzzer-decoder/linux/src/libtheora/lib/x86/mmxstate.c.html [Content-Type=text/html]...
Step #9: / [7/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
/ [8/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
/ [9/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                   
/ [10/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [11/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [12/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [13/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [14/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [15/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [16/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [17/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [18/40 files][  1.4 MiB/  2.1 MiB]  65% Done                                  
/ [19/40 files][  1.5 MiB/  2.1 MiB]  72% Done                                  
/ [20/40 files][  1.5 MiB/  2.1 MiB]  72% Done                                  
-
- [21/40 files][  1.7 MiB/  2.1 MiB]  82% Done                                  
- [22/40 files][  1.7 MiB/  2.1 MiB]  82% Done                                  
- [23/40 files][  1.9 MiB/  2.1 MiB]  88% Done                                  
- [24/40 files][  1.9 MiB/  2.1 MiB]  88% Done                                  
- [25/40 files][  1.9 MiB/  2.1 MiB]  92% Done                                  
- [26/40 files][  2.0 MiB/  2.1 MiB]  94% Done                                  
- [27/40 files][  2.0 MiB/  2.1 MiB]  94% Done                                  
- [28/40 files][  2.0 MiB/  2.1 MiB]  94% Done                                  
- [29/40 files][  2.0 MiB/  2.1 MiB]  94% Done                                  
- [30/40 files][  2.0 MiB/  2.1 MiB]  94% Done                                  
- [31/40 files][  2.0 MiB/  2.1 MiB]  96% Done                                  
- [32/40 files][  2.0 MiB/  2.1 MiB]  96% Done                                  
- [33/40 files][  2.0 MiB/  2.1 MiB]  96% Done                                  
- [34/40 files][  2.0 MiB/  2.1 MiB]  96% Done                                  
- [35/40 files][  2.0 MiB/  2.1 MiB]  96% Done                                  
- [36/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [37/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [38/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [39/40 files][  2.1 MiB/  2.1 MiB]  99% Done                                  
- [40/40 files][  2.1 MiB/  2.1 MiB] 100% Done                                  
Step #9: Operation completed over 40 objects/2.1 MiB.                                     
Finished Step #9
Starting Step #10
Step #10: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #10: CommandException: 1 files/objects could not be removed.
Finished Step #10
Starting Step #11
Step #11: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #11: Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/fuzzer-decoder.json [Content-Type=application/json]...
Step #11: / [0/2 files][    0.0 B/ 10.4 KiB]   0% Done                                    
Copying file:///workspace/out/libfuzzer-coverage-x86_64/fuzzer_stats/coverage_targets.txt [Content-Type=text/plain]...
Step #11: / [0/2 files][    0.0 B/ 10.4 KiB]   0% Done                                    
/ [1/2 files][ 10.4 KiB/ 10.4 KiB]  99% Done                                    
/ [2/2 files][ 10.4 KiB/ 10.4 KiB] 100% Done                                    
Step #11: Operation completed over 2 objects/10.4 KiB.                                     
Finished Step #11
Starting Step #12
Step #12: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #12: CommandException: 1 files/objects could not be removed.
Finished Step #12
Starting Step #13
Step #13: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #13: Copying file:///workspace/out/libfuzzer-coverage-x86_64/textcov_reports/fuzzer-decoder.covreport [Content-Type=application/octet-stream]...
Step #13: / [0/1 files][    0.0 B/281.0 KiB]   0% Done                                    
/ [1/1 files][281.0 KiB/281.0 KiB] 100% Done                                    
Step #13: Operation completed over 1 objects/281.0 KiB.                                    
Finished Step #13
Starting Step #14
Step #14: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #14: CommandException: 1 files/objects could not be removed.
Finished Step #14
Starting Step #15
Step #15: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #15: Copying file:///workspace/out/libfuzzer-coverage-x86_64/logs/fuzzer-decoder.log [Content-Type=application/octet-stream]...
Step #15: / [0/1 files][    0.0 B/  1.6 KiB]   0% Done                                    
/ [1/1 files][  1.6 KiB/  1.6 KiB] 100% Done                                    
Step #15: Operation completed over 1 objects/1.6 KiB.                                      
Finished Step #15
Starting Step #16
Step #16: Already have image (with digest): gcr.io/cloud-builders/gsutil
Step #16: Copying file:///workspace/srcmap.json [Content-Type=application/json]...
Step #16: / [0 files][    0.0 B/  648.0 B]                                                
/ [1 files][  648.0 B/  648.0 B]                                                
Step #16: Operation completed over 1 objects/648.0 B.                                      
Finished Step #16
Starting Step #17
Step #17: Already have image (with digest): gcr.io/cloud-builders/curl
Step #17: 
Step #17:                    ***** NOTICE *****
Step #17: 
Step #17: Supported `curl` versions can be found in the various images available at
Step #17: https://console.cloud.google.com/launcher/details/google/ubuntu1604.
Step #17: 
Step #17:                 ***** END OF NOTICE *****
Step #17: 
Step #17:   % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
Step #17:                                  Dload  Upload   Total   Spent    Left  Speed
Step #17: 
  0     0    0     0    0     0      0      0 --:--:-- --:--:-- --:--:--     0
100   315    0     0  100   315      0   1640 --:--:-- --:--:-- --:--:--  1649
Finished Step #17
PUSH
DONE