starting build "3c040e1c-1486-4900-9114-e82279a3f7a9"
FETCHSOURCE
BUILD
Starting Step #0
Step #0: Already have image (with digest): gcr.io/cloud-builders/git
Step #0: Cloning into 'oss-fuzz'...
Finished Step #0
Starting Step #1
Step #1: Already have image (with digest): gcr.io/cloud-builders/docker
Step #1: Sending build context to Docker daemon 26.11kB
Step #1: Step 1/6 : FROM gcr.io/oss-fuzz-base/base-builder
Step #1: latest: Pulling from oss-fuzz-base/base-builder
Step #1: b549f31133a9: Pulling fs layer
Step #1: dec9309a56ea: Pulling fs layer
Step #1: 2ac36f2efd79: Pulling fs layer
Step #1: 5ec988cea38a: Pulling fs layer
Step #1: 8e683fb379e8: Pulling fs layer
Step #1: 9f891fba8c78: Pulling fs layer
Step #1: 25fcf1e6241b: Pulling fs layer
Step #1: c668a360339d: Pulling fs layer
Step #1: 68e87b77edb8: Pulling fs layer
Step #1: f5fb4d6cfdaa: Pulling fs layer
Step #1: 51633e1517b0: Pulling fs layer
Step #1: e52d90295922: Pulling fs layer
Step #1: be0d3e2ef6e6: Pulling fs layer
Step #1: 1548ad8a9b5b: Pulling fs layer
Step #1: 0f856dba2078: Pulling fs layer
Step #1: 2b3f31e343f8: Pulling fs layer
Step #1: 366fb5c452b5: Pulling fs layer
Step #1: 9321548b138a: Pulling fs layer
Step #1: a49b199fd9f5: Pulling fs layer
Step #1: c38cc9d0658a: Pulling fs layer
Step #1: 6e2b2f2f8224: Pulling fs layer
Step #1: f5e25dc75102: Pulling fs layer
Step #1: 1cc1ba13f99c: Pulling fs layer
Step #1: 27e24efb6f46: Pulling fs layer
Step #1: d53d3aad68cc: Pulling fs layer
Step #1: 820601777549: Pulling fs layer
Step #1: 77cc868e2038: Pulling fs layer
Step #1: b51458c0a6fb: Pulling fs layer
Step #1: 57e64755c0e5: Pulling fs layer
Step #1: 46db2ee818a9: Pulling fs layer
Step #1: 992e6bdb5ffa: Pulling fs layer
Step #1: 16b329d45733: Pulling fs layer
Step #1: 366fb5c452b5: Waiting
Step #1: 9321548b138a: Waiting
Step #1: a49b199fd9f5: Waiting
Step #1: c38cc9d0658a: Waiting
Step #1: 6e2b2f2f8224: Waiting
Step #1: f5e25dc75102: Waiting
Step #1: 1cc1ba13f99c: Waiting
Step #1: 27e24efb6f46: Waiting
Step #1: d53d3aad68cc: Waiting
Step #1: 820601777549: Waiting
Step #1: 77cc868e2038: Waiting
Step #1: b51458c0a6fb: Waiting
Step #1: 57e64755c0e5: Waiting
Step #1: 46db2ee818a9: Waiting
Step #1: 992e6bdb5ffa: Waiting
Step #1: 16b329d45733: Waiting
Step #1: 68e87b77edb8: Waiting
Step #1: f5fb4d6cfdaa: Waiting
Step #1: 51633e1517b0: Waiting
Step #1: 5ec988cea38a: Waiting
Step #1: 8e683fb379e8: Waiting
Step #1: e52d90295922: Waiting
Step #1: be0d3e2ef6e6: Waiting
Step #1: 25fcf1e6241b: Waiting
Step #1: 9f891fba8c78: Waiting
Step #1: c668a360339d: Waiting
Step #1: 0f856dba2078: Waiting
Step #1: 1548ad8a9b5b: Waiting
Step #1: 2b3f31e343f8: Waiting
Step #1: 2ac36f2efd79: Verifying Checksum
Step #1: 2ac36f2efd79: Download complete
Step #1: b549f31133a9: Verifying Checksum
Step #1: b549f31133a9: Download complete
Step #1: 8e683fb379e8: Verifying Checksum
Step #1: 8e683fb379e8: Download complete
Step #1: 9f891fba8c78: Verifying Checksum
Step #1: 9f891fba8c78: Download complete
Step #1: 5ec988cea38a: Verifying Checksum
Step #1: 5ec988cea38a: Download complete
Step #1: dec9309a56ea: Verifying Checksum
Step #1: dec9309a56ea: Download complete
Step #1: c668a360339d: Verifying Checksum
Step #1: c668a360339d: Download complete
Step #1: 68e87b77edb8: Verifying Checksum
Step #1: 68e87b77edb8: Download complete
Step #1: b549f31133a9: Pull complete
Step #1: 51633e1517b0: Verifying Checksum
Step #1: 51633e1517b0: Download complete
Step #1: e52d90295922: Verifying Checksum
Step #1: e52d90295922: Download complete
Step #1: be0d3e2ef6e6: Verifying Checksum
Step #1: be0d3e2ef6e6: Download complete
Step #1: 1548ad8a9b5b: Verifying Checksum
Step #1: 1548ad8a9b5b: Download complete
Step #1: 0f856dba2078: Verifying Checksum
Step #1: 0f856dba2078: Download complete
Step #1: 2b3f31e343f8: Verifying Checksum
Step #1: 2b3f31e343f8: Download complete
Step #1: f5fb4d6cfdaa: Verifying Checksum
Step #1: f5fb4d6cfdaa: Download complete
Step #1: 366fb5c452b5: Verifying Checksum
Step #1: 366fb5c452b5: Download complete
Step #1: 9321548b138a: Verifying Checksum
Step #1: 9321548b138a: Download complete
Step #1: a49b199fd9f5: Verifying Checksum
Step #1: a49b199fd9f5: Download complete
Step #1: c38cc9d0658a: Verifying Checksum
Step #1: c38cc9d0658a: Download complete
Step #1: 6e2b2f2f8224: Verifying Checksum
Step #1: 6e2b2f2f8224: Download complete
Step #1: f5e25dc75102: Verifying Checksum
Step #1: f5e25dc75102: Download complete
Step #1: 1cc1ba13f99c: Verifying Checksum
Step #1: 1cc1ba13f99c: Download complete
Step #1: 27e24efb6f46: Verifying Checksum
Step #1: 27e24efb6f46: Download complete
Step #1: d53d3aad68cc: Verifying Checksum
Step #1: d53d3aad68cc: Download complete
Step #1: 25fcf1e6241b: Verifying Checksum
Step #1: 25fcf1e6241b: Download complete
Step #1: 820601777549: Verifying Checksum
Step #1: 820601777549: Download complete
Step #1: 77cc868e2038: Verifying Checksum
Step #1: 77cc868e2038: Download complete
Step #1: b51458c0a6fb: Verifying Checksum
Step #1: b51458c0a6fb: Download complete
Step #1: 46db2ee818a9: Verifying Checksum
Step #1: 46db2ee818a9: Download complete
Step #1: 992e6bdb5ffa: Verifying Checksum
Step #1: 992e6bdb5ffa: Download complete
Step #1: 57e64755c0e5: Verifying Checksum
Step #1: 57e64755c0e5: Download complete
Step #1: 16b329d45733: Verifying Checksum
Step #1: 16b329d45733: Download complete
Step #1: dec9309a56ea: Pull complete
Step #1: 2ac36f2efd79: Pull complete
Step #1: 5ec988cea38a: Pull complete
Step #1: 8e683fb379e8: Pull complete
Step #1: 9f891fba8c78: Pull complete
Step #1: 25fcf1e6241b: Pull complete
Step #1: c668a360339d: Pull complete
Step #1: 68e87b77edb8: Pull complete
Step #1: f5fb4d6cfdaa: Pull complete
Step #1: 51633e1517b0: Pull complete
Step #1: e52d90295922: Pull complete
Step #1: be0d3e2ef6e6: Pull complete
Step #1: 1548ad8a9b5b: Pull complete
Step #1: 0f856dba2078: Pull complete
Step #1: 2b3f31e343f8: Pull complete
Step #1: 366fb5c452b5: Pull complete
Step #1: 9321548b138a: Pull complete
Step #1: a49b199fd9f5: Pull complete
Step #1: c38cc9d0658a: Pull complete
Step #1: 6e2b2f2f8224: Pull complete
Step #1: f5e25dc75102: Pull complete
Step #1: 1cc1ba13f99c: Pull complete
Step #1: 27e24efb6f46: Pull complete
Step #1: d53d3aad68cc: Pull complete
Step #1: 820601777549: Pull complete
Step #1: 77cc868e2038: Pull complete
Step #1: b51458c0a6fb: Pull complete
Step #1: 57e64755c0e5: Pull complete
Step #1: 46db2ee818a9: Pull complete
Step #1: 992e6bdb5ffa: Pull complete
Step #1: 16b329d45733: Pull complete
Step #1: Digest: sha256:9111ea87e56c6e9209136ca5cfc17b6ae9b67ab87a0330066c8000a78b0944d1
Step #1: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest
Step #1: ---> 33c3df2aea4d
Step #1: Step 2/6 : RUN apt-get update && apt-get install -y --no-install-recommends cmake ninja-build && apt-get clean
Step #1: ---> Running in 28c53f8b2239
Step #1: Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [128 kB]
Step #1: Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB]
Step #1: Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease
Step #1: Get:5 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [1011 kB]
Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal-updates/main i386 Packages [1286 kB]
Step #1: Get:7 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [842 kB]
Step #1: Get:8 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [1273 kB]
Step #1: Get:9 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [4025 kB]
Step #1: Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages [4488 kB]
Step #1: Get:11 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 Packages [1560 kB]
Step #1: Get:12 http://archive.ubuntu.com/ubuntu focal-updates/universe i386 Packages [1004 kB]
Step #1: Fetched 15.7 MB in 1s (11.6 MB/s)
Step #1: Reading package lists...
Step #1: Reading package lists...
Step #1: Building dependency tree...
Step #1: Reading state information...
Step #1: The following additional packages will be installed:
Step #1: cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2
Step #1: Suggested packages:
Step #1: cmake-doc lrzip python3
Step #1: The following NEW packages will be installed:
Step #1: cmake cmake-data libarchive13 libicu66 libjsoncpp1 librhash0 libuv1 libxml2
Step #1: ninja-build
Step #1: 0 upgraded, 9 newly installed, 0 to remove and 0 not upgraded.
Step #1: Need to get 15.1 MB of archives.
Step #1: After this operation, 65.3 MB of additional disk space will be used.
Step #1: Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB]
Step #1: Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.7 [640 kB]
Step #1: Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB]
Step #1: Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB]
Step #1: Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.2 [327 kB]
Step #1: Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB]
Step #1: Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB]
Step #1: Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB]
Step #1: Get:9 http://archive.ubuntu.com/ubuntu focal/universe amd64 ninja-build amd64 1.10.0-1build1 [107 kB]
Step #1: [91mdebconf: delaying package configuration, since apt-utils is not installed
Step #1: [0mFetched 15.1 MB in 1s (22.0 MB/s)
Step #1: Selecting previously unselected package libicu66:amd64.
Step #1: (Reading database ...
(Reading database ... 5%
(Reading database ... 10%
(Reading database ... 15%
(Reading database ... 20%
(Reading database ... 25%
(Reading database ... 30%
(Reading database ... 35%
(Reading database ... 40%
(Reading database ... 45%
(Reading database ... 50%
(Reading database ... 55%
(Reading database ... 60%
(Reading database ... 65%
(Reading database ... 70%
(Reading database ... 75%
(Reading database ... 80%
(Reading database ... 85%
(Reading database ... 90%
(Reading database ... 95%
(Reading database ... 100%
(Reading database ... 17393 files and directories currently installed.)
Step #1: Preparing to unpack .../0-libicu66_66.1-2ubuntu2.1_amd64.deb ...
Step #1: Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Selecting previously unselected package libxml2:amd64.
Step #1: Preparing to unpack .../1-libxml2_2.9.10+dfsg-5ubuntu0.20.04.7_amd64.deb ...
Step #1: Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ...
Step #1: Selecting previously unselected package libuv1:amd64.
Step #1: Preparing to unpack .../2-libuv1_1.34.2-1ubuntu1.5_amd64.deb ...
Step #1: Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ...
Step #1: Selecting previously unselected package cmake-data.
Step #1: Preparing to unpack .../3-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ...
Step #1: Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package libarchive13:amd64.
Step #1: Preparing to unpack .../4-libarchive13_3.4.0-2ubuntu1.2_amd64.deb ...
Step #1: Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Selecting previously unselected package libjsoncpp1:amd64.
Step #1: Preparing to unpack .../5-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ...
Step #1: Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Selecting previously unselected package librhash0:amd64.
Step #1: Preparing to unpack .../6-librhash0_1.3.9-1_amd64.deb ...
Step #1: Unpacking librhash0:amd64 (1.3.9-1) ...
Step #1: Selecting previously unselected package cmake.
Step #1: Preparing to unpack .../7-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ...
Step #1: Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Selecting previously unselected package ninja-build.
Step #1: Preparing to unpack .../8-ninja-build_1.10.0-1build1_amd64.deb ...
Step #1: Unpacking ninja-build (1.10.0-1build1) ...
Step #1: Setting up libicu66:amd64 (66.1-2ubuntu2.1) ...
Step #1: Setting up ninja-build (1.10.0-1build1) ...
Step #1: Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ...
Step #1: Setting up librhash0:amd64 (1.3.9-1) ...
Step #1: Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.7) ...
Step #1: Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ...
Step #1: Setting up libarchive13:amd64 (3.4.0-2ubuntu1.2) ...
Step #1: Setting up cmake (3.16.3-1ubuntu1.20.04.1) ...
Step #1: Processing triggers for libc-bin (2.31-0ubuntu9.16) ...
Step #1: Removing intermediate container 28c53f8b2239
Step #1: ---> a013682def0e
Step #1: Step 3/6 : RUN git clone -b next --single-branch https://github.com/htacg/tidy-html5.git tidy-html5
Step #1: ---> Running in 6b892a53440b
Step #1: [91mCloning into 'tidy-html5'...
Step #1: [0mRemoving intermediate container 6b892a53440b
Step #1: ---> 48e268b99e79
Step #1: Step 4/6 : WORKDIR tidy-html5
Step #1: ---> Running in fa074172c073
Step #1: Removing intermediate container fa074172c073
Step #1: ---> f4ef26ba2b40
Step #1: Step 5/6 : COPY build.sh $SRC/
Step #1: ---> 78735e148579
Step #1: Step 6/6 : COPY *.c *.h *.options $SRC/
Step #1: ---> 34e39a4bd534
Step #1: Successfully built 34e39a4bd534
Step #1: Successfully tagged gcr.io/oss-fuzz/tidy-html5:latest
Finished Step #1
Starting Step #2 - "srcmap"
Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/tidy-html5
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + SRCMAP=/tmp/fileBjqbKO
Step #2 - "srcmap": + echo '{}'
Step #2 - "srcmap": + PATHS_TO_SCAN=/src
Step #2 - "srcmap": + [[ c++ == \g\o ]]
Step #2 - "srcmap": ++ find /src -name .git -type d
Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d)
Step #2 - "srcmap": ++ dirname /src/tidy-html5/.git
Step #2 - "srcmap": + GIT_DIR=/src/tidy-html5
Step #2 - "srcmap": + cd /src/tidy-html5
Step #2 - "srcmap": ++ git config --get remote.origin.url
Step #2 - "srcmap": + GIT_URL=https://github.com/htacg/tidy-html5.git
Step #2 - "srcmap": ++ git rev-parse HEAD
Step #2 - "srcmap": + GIT_REV=d08ddc2860aa95ba8e301343a30837f157977cba
Step #2 - "srcmap": + jq_inplace /tmp/fileBjqbKO '."/src/tidy-html5" = { type: "git", url: "https://github.com/htacg/tidy-html5.git", rev: "d08ddc2860aa95ba8e301343a30837f157977cba" }'
Step #2 - "srcmap": ++ tempfile
Step #2 - "srcmap": + F=/tmp/file4Kelc9
Step #2 - "srcmap": + cat /tmp/fileBjqbKO
Step #2 - "srcmap": + jq '."/src/tidy-html5" = { type: "git", url: "https://github.com/htacg/tidy-html5.git", rev: "d08ddc2860aa95ba8e301343a30837f157977cba" }'
Step #2 - "srcmap": + mv /tmp/file4Kelc9 /tmp/fileBjqbKO
Step #2 - "srcmap": ++ find /src -name .svn -type d
Step #2 - "srcmap": ++ find /src -name .hg -type d
Step #2 - "srcmap": + '[' '' '!=' '' ']'
Step #2 - "srcmap": + cat /tmp/fileBjqbKO
Step #2 - "srcmap": + rm /tmp/fileBjqbKO
Step #2 - "srcmap": {
Step #2 - "srcmap": "/src/tidy-html5": {
Step #2 - "srcmap": "type": "git",
Step #2 - "srcmap": "url": "https://github.com/htacg/tidy-html5.git",
Step #2 - "srcmap": "rev": "d08ddc2860aa95ba8e301343a30837f157977cba"
Step #2 - "srcmap": }
Step #2 - "srcmap": }
Finished Step #2 - "srcmap"
Starting Step #3 - "compile-libfuzzer-coverage-x86_64"
Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28
Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done.
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang
Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++
Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument
Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++
Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++
Step #3 - "compile-libfuzzer-coverage-x86_64": ---------------------------------------------------------------
Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir -p /work/tidy-html5
Step #3 - "compile-libfuzzer-coverage-x86_64": + cd /work/tidy-html5
Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -GNinja /src/tidy-html5/
Step #3 - "compile-libfuzzer-coverage-x86_64": [0mCMake Deprecation Warning at CMakeLists.txt:20 (cmake_minimum_required):
Step #3 - "compile-libfuzzer-coverage-x86_64": Compatibility with CMake < 3.5 will be removed from a future version of
Step #3 - "compile-libfuzzer-coverage-x86_64": CMake.
Step #3 - "compile-libfuzzer-coverage-x86_64":
Step #3 - "compile-libfuzzer-coverage-x86_64": Update the VERSION argument
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0xe1,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0x69,
Step #5:
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0x69,
Step #5:
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x50,0x52,0x65,0x3e,0x3c,0x51,0x3e,0x3c,0x51,0x3e,0x3c,0x51,0x3e,0x3c,0x50,0x52,0x65,
Step #5:
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0x25,0x3c,0x51,0x3e,0x51,
Step #5:
Q
Step #5: artifact_prefix='./'; Test unit written to ./oom-235944cb6bc55bccb4d6960dc77ebcdaaed34ad2
Step #5: Base64: PHBSRSU8UT5R
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 3
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2704786527
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/235944cb6bc55bccb4d6960dc77ebcdaaed34ad2' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 2045 processed earlier; will process 13829 files now
Step #5: #1 pulse exec/s: 0 rss: 31Mb
Step #5: #2 pulse exec/s: 0 rss: 31Mb
Step #5: #4 pulse exec/s: 0 rss: 31Mb
Step #5: #8 pulse exec/s: 0 rss: 31Mb
Step #5: #16 pulse exec/s: 0 rss: 31Mb
Step #5: #32 pulse exec/s: 0 rss: 31Mb
Step #5: #64 pulse exec/s: 0 rss: 31Mb
Step #5: #128 pulse exec/s: 0 rss: 31Mb
Step #5: #256 pulse exec/s: 0 rss: 31Mb
Step #5: #512 pulse exec/s: 0 rss: 31Mb
Step #5: ==127== ERROR: libFuzzer: out-of-memory (used: 2089Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
U
\012i
Step #5: artifact_prefix='./'; Test unit written to ./oom-182661e4f4d7c54753c319dcafb536583fae23be
Step #5: Base64: PHBSReE8aT4KPGk+aQ==
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 5
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2767070315
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/182661e4f4d7c54753c319dcafb536583fae23be' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 3362 processed earlier; will process 12512 files now
Step #5: #1 pulse exec/s: 0 rss: 31Mb
Step #5: #2 pulse exec/s: 0 rss: 31Mb
Step #5: #4 pulse exec/s: 0 rss: 31Mb
Step #5: #8 pulse exec/s: 0 rss: 31Mb
Step #5: #16 pulse exec/s: 0 rss: 31Mb
Step #5: #32 pulse exec/s: 0 rss: 31Mb
Step #5: #64 pulse exec/s: 0 rss: 31Mb
Step #5: #128 pulse exec/s: 0 rss: 31Mb
Step #5: ==154== ERROR: libFuzzer: out-of-memory (used: 2085Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
/$
Step #5: artifact_prefix='./'; Test unit written to ./oom-4258174421364b2b81dbd0b08175727b717e2a85
Step #5: Base64: PHBSRSU8UcU8TUFwPi8k
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 6
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2798205537
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/4258174421364b2b81dbd0b08175727b717e2a85' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 3613 processed earlier; will process 12261 files now
Step #5: #1 pulse exec/s: 0 rss: 31Mb
Step #5: #2 pulse exec/s: 0 rss: 31Mb
Step #5: #4 pulse exec/s: 0 rss: 31Mb
Step #5: #8 pulse exec/s: 0 rss: 31Mb
Step #5: #16 pulse exec/s: 0 rss: 31Mb
Step #5: #32 pulse exec/s: 0 rss: 31Mb
Step #5: #64 pulse exec/s: 0 rss: 31Mb
Step #5: ==169== ERROR: libFuzzer: out-of-memory (used: 2083Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Q
Step #5: artifact_prefix='./'; Test unit written to ./oom-42e6cd8b489be33c4c1662a06fa6d2c766ab3097
Step #5: Base64: PFE+PHBSRSU8UT48UT5R
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 7
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2829340753
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/42e6cd8b489be33c4c1662a06fa6d2c766ab3097' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 3732 processed earlier; will process 12142 files now
Step #5: #1 pulse exec/s: 0 rss: 33Mb
Step #5: #2 pulse exec/s: 0 rss: 33Mb
Step #5: #4 pulse exec/s: 0 rss: 33Mb
Step #5: #8 pulse exec/s: 0 rss: 33Mb
Step #5: #16 pulse exec/s: 0 rss: 33Mb
Step #5: #32 pulse exec/s: 0 rss: 33Mb
Step #5: #64 pulse exec/s: 0 rss: 33Mb
Step #5: #128 pulse exec/s: 0 rss: 33Mb
Step #5: #256 pulse exec/s: 0 rss: 33Mb
Step #5: ==181== ERROR: libFuzzer: out-of-memory (used: 2083Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
<
Step #5: artifact_prefix='./'; Test unit written to ./oom-bbffe45372a74a66cc2e271af50809632cb447ff
Step #5: Base64: PHhtcD48Uz48L0I+PFM+PA==
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 8
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2860505894
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/bbffe45372a74a66cc2e271af50809632cb447ff' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 4037 processed earlier; will process 11837 files now
Step #5: #1 pulse exec/s: 0 rss: 31Mb
Step #5: #2 pulse exec/s: 0 rss: 31Mb
Step #5: #4 pulse exec/s: 0 rss: 31Mb
Step #5: #8 pulse exec/s: 0 rss: 31Mb
Step #5: #16 pulse exec/s: 0 rss: 31Mb
Step #5: #32 pulse exec/s: 0 rss: 31Mb
Step #5: #64 pulse exec/s: 0 rss: 31Mb
Step #5: #128 pulse exec/s: 0 rss: 31Mb
Step #5: ==208== ERROR: libFuzzer: out-of-memory (used: 2082Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=\012\012i
Step #5: artifact_prefix='./'; Test unit written to ./oom-3206c1aab4d2fc8a10c87abd983da305df55888b
Step #5: Base64: PHBSRQo8aT4KPGk+CjxpPmk=
Step #5: SUMMARY: libFuzzer: out-of-memory
Step #5: MERGE-OUTER: attempt 10
Step #5: INFO: Running with entropic power schedule (0xFF, 100).
Step #5: INFO: Seed: 2922778799
Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes
Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt'
Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/3206c1aab4d2fc8a10c87abd983da305df55888b' caused a failure at the previous merge step
Step #5: MERGE-INNER: 15874 total files; 4256 processed earlier; will process 11618 files now
Step #5: #1 pulse exec/s: 0 rss: 33Mb
Step #5: #2 pulse exec/s: 0 rss: 33Mb
Step #5: #4 pulse exec/s: 0 rss: 33Mb
Step #5: #8 pulse exec/s: 0 rss: 33Mb
Step #5: #16 pulse exec/s: 0 rss: 33Mb
Step #5: #32 pulse exec/s: 0 rss: 33Mb
Step #5: #64 pulse exec/s: 0 rss: 33Mb
Step #5: ==290== ERROR: libFuzzer: out-of-memory (used: 2182Mb; limit: 2048Mb)
Step #5: To change the out-of-memory limit use -rss_limit_mb=
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x70,0x52,0x45,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,
Step #5:
\012>\012\012
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x51,0x3c,0x50,0x52,0x65,0x3e,0xbc,0x58,0x52,0x65,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,
Step #5:
\274XRe
Step #5:
Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000
Step #5: 0x3c,0x78,0x6d,0x70,0x3c,0x3c,0x73,0x2f,0x50,0x3c,0x2f,0x50,0x3e,0x3c,0x2f,0x50,0x3e,0x3c,0x2f,0x50,0x3e,
Step #5:
<-
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x72,0x45,0x3e,0x3c,0x55,0x3e,0x1,0xa8,0x3c,0x2f,0xb4,0xb7,0xab,0xb3,0xc1,0xc3,0xb7,0xff,0x0, Step #5:
\001\250\264\267\253\263\301\303\267\377\000 Step #5: artifact_prefix='./'; Test unit written to ./oom-bfe550b0450766723ee620879c3085fe36c1ab0d Step #5: Base64: PHByRT48VT4BqDwvtLers8HDt/8A Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 17 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3148760345 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/bfe550b0450766723ee620879c3085fe36c1ab0d' caused a failure at the previous merge step Step #5: MERGE-INNER: 15874 total files; 5081 processed earlier; will process 10793 files now Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: #2 pulse exec/s: 0 rss: 31Mb Step #5: #4 pulse exec/s: 0 rss: 31Mb Step #5: #8 pulse exec/s: 0 rss: 31Mb Step #5: ==374== ERROR: libFuzzer: out-of-memory (used: 2049Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x52,0x45,0xa,0x3c,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69,0x3e,0xa,0x3c,0x69, Step #5: \012\012\012\012 Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x50,0x52,0x65,0x3e,0x3c,0x51,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65,0x3e,0x3c,0x50,0x52,0x65, Step #5:Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x52,0x45,0x25,0x3c,0x51,0x3e,0x3c,0x4e,0x3e,0x3c,0x51,0x3e,0x3c,0x70,0x3e,0x3c,0x70,0x3e,0x2d,0x3c,0x70, Step #5:-
Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x62,0xff,0x30,0xcb,0x3c,0x70,0x52,0x65,0x0,0x20,0x3e,0x3c,0x68,0x31,0x3c,0x3e,0x3c,0x64,0x69,0x76,0x3e,0x23, Step #5:
# Step #5: artifact_prefix='./'; Test unit written to ./oom-af7f0aaa830e3a3b4e09279c2dc3a41ebe64b290 Step #5: Base64: PGL/MMs8cFJlACA+PGgxPD48ZGl2PiM= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 21 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3272308224 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/af7f0aaa830e3a3b4e09279c2dc3a41ebe64b290' caused a failure at the previous merge step Step #5: MERGE-INNER: 15874 total files; 5246 processed earlier; will process 10628 files now Step #5: #1 pulse exec/s: 0 rss: 33Mb Step #5: #2 pulse exec/s: 0 rss: 33Mb Step #5: #4 pulse exec/s: 0 rss: 33Mb Step #5: #8 pulse exec/s: 0 rss: 33Mb Step #5: #16 pulse exec/s: 0 rss: 33Mb Step #5: #32 pulse exec/s: 0 rss: 33Mb Step #5: #64 pulse exec/s: 0 rss: 33Mb Step #5: #128 pulse exec/s: 0 rss: 33Mb Step #5: ==416== ERROR: libFuzzer: out-of-memory (used: 2085Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x78,0x6d,0x70,0x3c,0x3c,0x73,0x2f,0x50,0x3c,0x2f,0x50,0x3e,0x3c,0x2f,0x50,0x3e,0x3c,0x50,0x3e,0x3c,0x2f,0x50,0x3e, Step #5: Step #5: artifact_prefix='./'; Test unit written to ./oom-2091ab328196b6d3b05513ca94981e1f474ef703 Step #5: Base64: PHhtcDw8cy9QPC9QPjwvUD48UD48L1A+ Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 22 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3303444277 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/2091ab328196b6d3b05513ca94981e1f474ef703' caused a failure at the previous merge step Step #5: MERGE-INNER: 15874 total files; 5483 processed earlier; will process 10391 files now Step #5: #1 pulse exec/s: 0 rss: 33Mb Step #5: #2 pulse exec/s: 0 rss: 33Mb Step #5: #4 pulse exec/s: 0 rss: 33Mb Step #5: #8 pulse exec/s: 0 rss: 33Mb Step #5: #16 pulse exec/s: 0 rss: 33Mb Step #5: ==428== ERROR: libFuzzer: out-of-memory (used: 2093Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x54,0x74,0x3e,0x3c,0x70,0x52,0x65,0xca,0x3c,0x2f,0x68,0x72,0x3e,0x3c,0x2f,0x68,0x72,0x3e,0x3c,0x2f,0x68,0x72,0x3e, Step #5: Step #5: artifact_prefix='./'; Test unit written to ./oom-36f49a58c6d816997660b2dd3464e9a24a1d679e Step #5: Base64: PFR0PjxwUmXKPC9ocj48L2hyPjwvaHI+ Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 23 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 3334581655 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge55.txt' Step #5: MERGE-INNER: '/corpus/tidy_fuzzer/36f49a58c6d816997660b2dd3464e9a24a1d679e' caused a failure at the previous merge step Step #5: MERGE-INNER: 15874 total files; 5507 processed earlier; will process 10367 files now Step #5: #1 pulse exec/s: 0 rss: 31Mb Step #5: #2 pulse exec/s: 0 rss: 31Mb Step #5: #4 pulse exec/s: 0 rss: 31Mb Step #5: #8 pulse exec/s: 0 rss: 31Mb Step #5: #16 pulse exec/s: 0 rss: 31Mb Step #5: #32 pulse exec/s: 0 rss: 31Mb Step #5: #64 pulse exec/s: 0 rss: 31Mb Step #5: ==440== ERROR: libFuzzer: out-of-memory (used: 2315Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb=Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0xb1,0x3c,0x73,0x3c,0x44,0x63,0x0,0xfe,0x3c,0x42,0xff,0x3e,0x3c,0xfd,0xcb,0x3c,0x70,0x52,0x65,0x3e,0x3c,0x4f,0x6c,0x0,0x1e, Step #5: \261 <\375\313Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x3c,0x70,0x72,0x45,0x3e,0x3c,0x55,0x3e,0x1,0x4d,0x3c,0x2f,0x48,0x54,0x4d,0x4c,0x3e,0x3c,0x48,0x54,0x4d,0x0,0x4c,0xff,0x0, Step #5:
\001M