starting build "44a8e1f3-daee-4272-a271-19fb0baaf2fa" FETCHSOURCE BUILD Starting Step #0 Step #0: Already have image (with digest): gcr.io/cloud-builders/git Step #0: Cloning into 'oss-fuzz'... Finished Step #0 Starting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79" Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Already have image (with digest): gcr.io/cloud-builders/docker Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Sending build context to Docker daemon 5.12kB Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Step 1/5 : FROM gcr.io/oss-fuzz-base/base-builder Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": latest: Pulling from oss-fuzz-base/base-builder Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b549f31133a9: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d4dd822bbffb: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d8fc000f412: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3361395d6e44: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 48b5b52d0b6b: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 133d1078471d: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 067b043f6c3d: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b378ee38e924: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 56cba17d63ec: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0c2c0ffee9e9: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 87afe3e74a6f: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0dcbbd7b1e2b: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 96f172c7630c: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": c11c0e8d790b: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ea461ccc518a: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8464fcdf5650: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3361395d6e44: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": be9c3055ce18: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 9e2aefad8bb5: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": e49cca9f06ca: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 48b5b52d0b6b: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8c015615c97f: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d81dcfcb6dc: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 133d1078471d: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d2ea0ce4f46f: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7f3d4930022b: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 067b043f6c3d: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 56cba17d63ec: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 13a21c9fae89: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 17afa181c115: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7cc08c3a1dbf: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": fd9e54733f66: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0c2c0ffee9e9: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 688d1a420abf: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 73ea241ea4d8: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 87afe3e74a6f: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4c89e2ea8dbc: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 441d7463a69a: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3fa465ac5942: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0dcbbd7b1e2b: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 518907e5c0ad: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 326319e6c6d5: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d3c8b77e4984: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 67846ae876b5: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": e49cca9f06ca: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 96f172c7630c: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8c015615c97f: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 44506760bc19: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": be9c3055ce18: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": f3b60835fbba: Pulling fs layer Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d81dcfcb6dc: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": c11c0e8d790b: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 9e2aefad8bb5: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 441d7463a69a: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": fd9e54733f66: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ea461ccc518a: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 326319e6c6d5: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d2ea0ce4f46f: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8464fcdf5650: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d3c8b77e4984: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 688d1a420abf: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3fa465ac5942: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 67846ae876b5: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 13a21c9fae89: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 44506760bc19: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7cc08c3a1dbf: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": f3b60835fbba: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 518907e5c0ad: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4c89e2ea8dbc: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b378ee38e924: Waiting Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d8fc000f412: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b549f31133a9: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b549f31133a9: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 48b5b52d0b6b: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 48b5b52d0b6b: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3361395d6e44: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3361395d6e44: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 133d1078471d: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 133d1078471d: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b378ee38e924: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d4dd822bbffb: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d4dd822bbffb: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 56cba17d63ec: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b549f31133a9: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 87afe3e74a6f: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 87afe3e74a6f: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0c2c0ffee9e9: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0c2c0ffee9e9: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0dcbbd7b1e2b: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0dcbbd7b1e2b: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 96f172c7630c: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 96f172c7630c: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": c11c0e8d790b: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": c11c0e8d790b: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ea461ccc518a: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ea461ccc518a: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8464fcdf5650: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": be9c3055ce18: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": be9c3055ce18: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 9e2aefad8bb5: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 9e2aefad8bb5: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": e49cca9f06ca: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": e49cca9f06ca: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 067b043f6c3d: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8c015615c97f: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8c015615c97f: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d81dcfcb6dc: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d81dcfcb6dc: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d2ea0ce4f46f: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 13a21c9fae89: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 13a21c9fae89: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7f3d4930022b: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7f3d4930022b: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 17afa181c115: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7cc08c3a1dbf: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": fd9e54733f66: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 688d1a420abf: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 688d1a420abf: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 73ea241ea4d8: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 73ea241ea4d8: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 441d7463a69a: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 441d7463a69a: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3fa465ac5942: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3fa465ac5942: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4c89e2ea8dbc: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4c89e2ea8dbc: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 518907e5c0ad: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 518907e5c0ad: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d4dd822bbffb: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 326319e6c6d5: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d3c8b77e4984: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d3c8b77e4984: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d8fc000f412: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 67846ae876b5: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 67846ae876b5: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 44506760bc19: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 44506760bc19: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": f3b60835fbba: Verifying Checksum Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": f3b60835fbba: Download complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3361395d6e44: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 48b5b52d0b6b: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 133d1078471d: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 067b043f6c3d: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": b378ee38e924: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 56cba17d63ec: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0c2c0ffee9e9: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 87afe3e74a6f: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0dcbbd7b1e2b: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 96f172c7630c: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": c11c0e8d790b: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ea461ccc518a: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8464fcdf5650: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": be9c3055ce18: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 9e2aefad8bb5: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": e49cca9f06ca: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 8c015615c97f: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4d81dcfcb6dc: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d2ea0ce4f46f: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7f3d4930022b: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 13a21c9fae89: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 17afa181c115: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 7cc08c3a1dbf: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": fd9e54733f66: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 688d1a420abf: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 73ea241ea4d8: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 4c89e2ea8dbc: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 441d7463a69a: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 3fa465ac5942: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 518907e5c0ad: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 326319e6c6d5: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": d3c8b77e4984: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 67846ae876b5: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 44506760bc19: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": f3b60835fbba: Pull complete Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Digest: sha256:49b1cbc8dcdcb31676cbb4cb51985f2052a57ade59df80ebc498b67953982aa4 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-builder:latest Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> 1b8163539497 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Step 2/5 : RUN apt-get update && apt-get install -y cmake m4 zlib1g-dev libcurlpp-dev libcurl4-openssl-dev Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> Running in 7c5add3e4c97 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Hit:1 http://security.ubuntu.com/ubuntu focal-security InRelease Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Hit:2 http://archive.ubuntu.com/ubuntu focal InRelease Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:3 http://archive.ubuntu.com/ubuntu focal-updates InRelease [128 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Hit:4 http://archive.ubuntu.com/ubuntu focal-backports InRelease Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Fetched 128 kB in 1s (123 kB/s) Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Reading package lists... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Reading package lists... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Building dependency tree... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Reading state information... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": m4 is already the newest version (1.4.18-4). Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": m4 set to manually installed. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": The following package was automatically installed and is no longer required: Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": autotools-dev Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Use 'apt autoremove' to remove it. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": The following additional packages will be installed: Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": cmake-data libarchive13 libcurlpp0 libicu66 libjsoncpp1 librhash0 libuv1 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": libxml2 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Suggested packages: Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": cmake-doc ninja-build lrzip libcurl4-doc libidn11-dev libkrb5-dev Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": libldap2-dev librtmp-dev libssh2-1-dev pkg-config Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": The following NEW packages will be installed: Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": cmake cmake-data libarchive13 libcurl4-openssl-dev libcurlpp-dev libcurlpp0 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": libicu66 libjsoncpp1 librhash0 libuv1 libxml2 zlib1g-dev Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": 0 upgraded, 12 newly installed, 0 to remove and 0 not upgraded. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Need to get 15.6 MB of archives. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": After this operation, 67.7 MB of additional disk space will be used. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:1 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libicu66 amd64 66.1-2ubuntu2.1 [8515 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:2 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libxml2 amd64 2.9.10+dfsg-5ubuntu0.20.04.10 [640 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:3 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libuv1 amd64 1.34.2-1ubuntu1.5 [80.9 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:4 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake-data all 3.16.3-1ubuntu1.20.04.1 [1613 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:5 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libarchive13 amd64 3.4.0-2ubuntu1.5 [327 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:6 http://archive.ubuntu.com/ubuntu focal/main amd64 libjsoncpp1 amd64 1.7.4-3.1ubuntu2 [75.6 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:7 http://archive.ubuntu.com/ubuntu focal/main amd64 librhash0 amd64 1.3.9-1 [113 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:8 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 cmake amd64 3.16.3-1ubuntu1.20.04.1 [3668 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:9 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 libcurl4-openssl-dev amd64 7.68.0-1ubuntu2.25 [322 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:10 http://archive.ubuntu.com/ubuntu focal-updates/main amd64 zlib1g-dev amd64 1:1.2.11.dfsg-2ubuntu1.5 [155 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:11 http://archive.ubuntu.com/ubuntu focal/universe amd64 libcurlpp0 amd64 0.8.1-2build2 [27.9 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Get:12 http://archive.ubuntu.com/ubuntu focal/universe amd64 libcurlpp-dev amd64 0.8.1-2build2 [48.7 kB] Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": debconf: delaying package configuration, since apt-utils is not installed Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Fetched 15.6 MB in 2s (9462 kB/s) Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libicu66:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 17483 files and directories currently installed.) Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../00-libicu66_66.1-2ubuntu2.1_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libxml2:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../01-libxml2_2.9.10+dfsg-5ubuntu0.20.04.10_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libuv1:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../02-libuv1_1.34.2-1ubuntu1.5_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package cmake-data. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../03-cmake-data_3.16.3-1ubuntu1.20.04.1_all.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libarchive13:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../04-libarchive13_3.4.0-2ubuntu1.5_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libarchive13:amd64 (3.4.0-2ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libjsoncpp1:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../05-libjsoncpp1_1.7.4-3.1ubuntu2_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package librhash0:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../06-librhash0_1.3.9-1_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking librhash0:amd64 (1.3.9-1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package cmake. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../07-cmake_3.16.3-1ubuntu1.20.04.1_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libcurl4-openssl-dev:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../08-libcurl4-openssl-dev_7.68.0-1ubuntu2.25_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libcurl4-openssl-dev:amd64 (7.68.0-1ubuntu2.25) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package zlib1g-dev:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../09-zlib1g-dev_1%3a1.2.11.dfsg-2ubuntu1.5_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libcurlpp0:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../10-libcurlpp0_0.8.1-2build2_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libcurlpp0:amd64 (0.8.1-2build2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Selecting previously unselected package libcurlpp-dev:amd64. Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Preparing to unpack .../11-libcurlpp-dev_0.8.1-2build2_amd64.deb ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Unpacking libcurlpp-dev:amd64 (0.8.1-2build2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libcurlpp0:amd64 (0.8.1-2build2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libicu66:amd64 (66.1-2ubuntu2.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libuv1:amd64 (1.34.2-1ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libcurl4-openssl-dev:amd64 (7.68.0-1ubuntu2.25) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libcurlpp-dev:amd64 (0.8.1-2build2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up zlib1g-dev:amd64 (1:1.2.11.dfsg-2ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up librhash0:amd64 (1.3.9-1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up cmake-data (3.16.3-1ubuntu1.20.04.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libxml2:amd64 (2.9.10+dfsg-5ubuntu0.20.04.10) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libjsoncpp1:amd64 (1.7.4-3.1ubuntu2) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up libarchive13:amd64 (3.4.0-2ubuntu1.5) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Setting up cmake (3.16.3-1ubuntu1.20.04.1) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Processing triggers for libc-bin (2.31-0ubuntu9.18) ... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Removing intermediate container 7c5add3e4c97 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> 67bd211cbd97 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Step 3/5 : RUN git clone --depth 1 https://github.com/Unidata/netcdf-c Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> Running in 23d72a89233f Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Cloning into 'netcdf-c'... Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Removing intermediate container 23d72a89233f Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> 1a5341ab776e Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Step 4/5 : COPY build.sh $SRC Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> 4d9d4bdaca6d Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Step 5/5 : WORKDIR $SRC/netcdf-c Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> Running in e2167754cb38 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Removing intermediate container e2167754cb38 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": ---> 5d7dd40aebf1 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Successfully built 5d7dd40aebf1 Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Successfully tagged gcr.io/oss-fuzz/netcdf:latest Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79": Successfully tagged us-central1-docker.pkg.dev/oss-fuzz/unsafe/netcdf:latest Finished Step #1 - "build-d4164e6d-7085-45bd-b452-8f32290adc79" Starting Step #2 - "srcmap" Step #2 - "srcmap": Already have image: gcr.io/oss-fuzz/netcdf Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + SRCMAP=/tmp/filefgcnkN Step #2 - "srcmap": + echo '{}' Step #2 - "srcmap": + PATHS_TO_SCAN=/src Step #2 - "srcmap": + [[ c++ == \g\o ]] Step #2 - "srcmap": ++ find /src -name .git -type d Step #2 - "srcmap": + for DOT_GIT_DIR in $(find $PATHS_TO_SCAN -name ".git" -type d) Step #2 - "srcmap": ++ dirname /src/netcdf-c/.git Step #2 - "srcmap": + GIT_DIR=/src/netcdf-c Step #2 - "srcmap": + cd /src/netcdf-c Step #2 - "srcmap": ++ git config --get remote.origin.url Step #2 - "srcmap": + GIT_URL=https://github.com/Unidata/netcdf-c Step #2 - "srcmap": ++ git rev-parse HEAD Step #2 - "srcmap": + GIT_REV=842fa39bba23a8be1b5609dfaa4788b0ea0a7673 Step #2 - "srcmap": + jq_inplace /tmp/filefgcnkN '."/src/netcdf-c" = { type: "git", url: "https://github.com/Unidata/netcdf-c", rev: "842fa39bba23a8be1b5609dfaa4788b0ea0a7673" }' Step #2 - "srcmap": ++ tempfile Step #2 - "srcmap": + F=/tmp/fileviEeCb Step #2 - "srcmap": + cat /tmp/filefgcnkN Step #2 - "srcmap": + jq '."/src/netcdf-c" = { type: "git", url: "https://github.com/Unidata/netcdf-c", rev: "842fa39bba23a8be1b5609dfaa4788b0ea0a7673" }' Step #2 - "srcmap": + mv /tmp/fileviEeCb /tmp/filefgcnkN Step #2 - "srcmap": ++ find /src -name .svn -type d Step #2 - "srcmap": ++ find /src -name .hg -type d Step #2 - "srcmap": + '[' '' '!=' '' ']' Step #2 - "srcmap": + cat /tmp/filefgcnkN Step #2 - "srcmap": + rm /tmp/filefgcnkN Step #2 - "srcmap": { Step #2 - "srcmap": "/src/netcdf-c": { Step #2 - "srcmap": "type": "git", Step #2 - "srcmap": "url": "https://github.com/Unidata/netcdf-c", Step #2 - "srcmap": "rev": "842fa39bba23a8be1b5609dfaa4788b0ea0a7673" Step #2 - "srcmap": } Step #2 - "srcmap": } Finished Step #2 - "srcmap" Starting Step #3 - "compile-libfuzzer-coverage-x86_64" Step #3 - "compile-libfuzzer-coverage-x86_64": Already have image (with digest): gcr.io/cloud-builders/docker Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": vm.mmap_rnd_bits = 28 Step #3 - "compile-libfuzzer-coverage-x86_64": Compiling libFuzzer to /usr/lib/libFuzzingEngine.a... done. Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": CC=clang Step #3 - "compile-libfuzzer-coverage-x86_64": CXX=clang++ Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument Step #3 - "compile-libfuzzer-coverage-x86_64": CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ Step #3 - "compile-libfuzzer-coverage-x86_64": RUSTFLAGS=--cfg fuzzing -Cdebuginfo=1 -Cforce-frame-pointers -Cinstrument-coverage -C link-arg=-lc++ Step #3 - "compile-libfuzzer-coverage-x86_64": --------------------------------------------------------------- Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fPIC' Step #3 - "compile-libfuzzer-coverage-x86_64": + CFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fPIC' Step #3 - "compile-libfuzzer-coverage-x86_64": + export 'CXXFLAGS=-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fPIC' Step #3 - "compile-libfuzzer-coverage-x86_64": + CXXFLAGS='-O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -stdlib=libc++ -fPIC' Step #3 - "compile-libfuzzer-coverage-x86_64": + mkdir build Step #3 - "compile-libfuzzer-coverage-x86_64": + cd build Step #3 - "compile-libfuzzer-coverage-x86_64": + cmake -DBUILD_SHARED_LIBS=OFF -DENABLE_HDF5=OFF -DENABLE_DAP=OFF .. Step #3 - "compile-libfuzzer-coverage-x86_64": -- The C compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- The CXX compiler identification is Clang 18.1.8 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working C compiler: /usr/local/bin/clang - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting C compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compiler ABI info - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check for working CXX compiler: /usr/local/bin/clang++ - skipped Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features Step #3 - "compile-libfuzzer-coverage-x86_64": -- Detecting CXX compile features - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Checking for Deprecated Options Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at cmake/deprecated.cmake:17 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": ENABLE_DAP is deprecated and will be removed. Please use NETCDF_ENABLE_DAP Step #3 - "compile-libfuzzer-coverage-x86_64": in the future Step #3 - "compile-libfuzzer-coverage-x86_64": Call Stack (most recent call first): Step #3 - "compile-libfuzzer-coverage-x86_64": cmake/deprecated.cmake:38 (check_depr_opt) Step #3 - "compile-libfuzzer-coverage-x86_64": CMakeLists.txt:46 (include) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at cmake/deprecated.cmake:17 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": ENABLE_HDF5 is deprecated and will be removed. Please use Step #3 - "compile-libfuzzer-coverage-x86_64": NETCDF_ENABLE_HDF5 in the future Step #3 - "compile-libfuzzer-coverage-x86_64": Call Stack (most recent call first): Step #3 - "compile-libfuzzer-coverage-x86_64": cmake/deprecated.cmake:38 (check_depr_opt) Step #3 - "compile-libfuzzer-coverage-x86_64": CMakeLists.txt:46 (include) Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- NETCDF_ENABLE_PLUGINS: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found Math library: /usr/lib/x86_64-linux-gnu/libm.so Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found version "1.2.11") Step #3 - "compile-libfuzzer-coverage-x86_64": -- Checking for filter libraries Step #3 - "compile-libfuzzer-coverage-x86_64": libbz2 not found using built-in version Step #3 - "compile-libfuzzer-coverage-x86_64": -- libzip development package not found, disabling NETCDF_ENABLE_NCZARR_ZIP Step #3 - "compile-libfuzzer-coverage-x86_64": -- Could NOT find LibXml2 (missing: LIBXML2_LIBRARY LIBXML2_INCLUDE_DIR) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Enabling use of fill value when NC_ERANGE Step #3 - "compile-libfuzzer-coverage-x86_64": -- Enabling a more relaxed check for NC_EINVALCOORDS Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at CMakeLists.txt:1048 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": NETCDF_ENABLE_FILTER_TESTING requires shared libraries. Disabling. Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for math.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for math.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for unistd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for unistd.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for alloca.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for alloca.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for malloc.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for malloc.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fcntl.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getopt.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getopt.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for locale.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for locale.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdint.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdint.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdio.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdio.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdlib.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdlib.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ctype.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ctype.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/xattr_h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/xattr_h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdarg.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stdarg.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strings.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strings.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for signal.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for signal.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/param.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/param.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/stat.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/stat.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/time.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/time.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/types.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/types.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/mman.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/mman.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/resource.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sys/resource.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inttypes.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for inttypes.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pstdint.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for pstdint.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for endian.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for endian.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for BaseTsd.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for BaseTsd.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stddef.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for stddef.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for string.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for string.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for winsock2.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for winsock2.h - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ftw.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for ftw.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for libgen.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for libgen.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for execinfo.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for execinfo.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dirent.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dirent.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for time.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for time.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dlfcn.h Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for dlfcn.h - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isfinite Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isfinite - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isnan Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isnan - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isinf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for isinf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for st_blksize Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for st_blksize - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for alloca Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for alloca - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for snprintf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for snprintf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of char Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of char - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of double Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of double - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of float Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of float - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of schar Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of schar - failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned long long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned long long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off64_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of off64_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of short Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of short - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ushort Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ushort - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of _Bool Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of _Bool - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of size_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of size_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ssize_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ptrdiff_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of ptrdiff_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uintptr_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uintptr_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of mode_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of mode_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of __int64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of __int64 - failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int64_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of int64_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64 - failed Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned char Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned char - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned short int Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned short int - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned int Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned int - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of long long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned long long Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of unsigned long long - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64_t Step #3 - "compile-libfuzzer-coverage-x86_64": -- Check size of uint64_t - done Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fsync Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fsync - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlcat Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlcat - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strdup Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strdup - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strndup Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strndup - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlen Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strlen - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoll Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoll - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strcasecmp Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strcasecmp - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoull Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for strtoull - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mkstemp Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mkstemp - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mktemp Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mktemp - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for random Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for random - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gettimeofday Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for gettimeofday - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for MPI_Comm_f2c Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for MPI_Comm_f2c - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for MPI_Info_f2c Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for MPI_Info_f2c - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for memmove Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for memmove - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getpagesize Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getpagesize - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sysconf Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for sysconf - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getrlimit Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for getrlimit - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for _filelengthi64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for _filelengthi64 - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mmap - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mremap Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for mremap - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fileno Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for fileno - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for H5Literate2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for H5Literate2 - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for clock_gettime Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for clock_gettime - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for struct timespec Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for struct timespec - not found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for atexit Step #3 - "compile-libfuzzer-coverage-x86_64": -- Looking for atexit - found Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MAPANON Step #3 - "compile-libfuzzer-coverage-x86_64": -- Performing Test HAVE_MAPANON - Success Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found m4: /usr/bin/m4 Step #3 - "compile-libfuzzer-coverage-x86_64": -- Found bash: /usr/bin/bash Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_SOURCE_DIR=/src/netcdf-c Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_BINARY_DIR=/src/netcdf-c/build Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_CURRENT_SOURCE_DIR=/src/netcdf-c/nc_test Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_CURRENT_BINARY_DIR=/src/netcdf-c/build/nc_test Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Configuration Summary: Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building Shared Libraries: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building netCDF-4: Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building DAP2 Support: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building DAP4 Support: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building Byte-range Support: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Building Utilities: ON Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Tests Enabled: ON Step #3 - "compile-libfuzzer-coverage-x86_64": -- DAP Remote Tests: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Extra Tests: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Coverage Tests: Step #3 - "compile-libfuzzer-coverage-x86_64": -- Parallel Tests: OFF Step #3 - "compile-libfuzzer-coverage-x86_64": -- Large File Tests: Step #3 - "compile-libfuzzer-coverage-x86_64": -- Extreme Numbers: ON Step #3 - "compile-libfuzzer-coverage-x86_64": -- Unit Tests: ON Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": Compiler: Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build Type: DEBUG Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_C_COMPILER: /usr/local/bin/clang Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_C_FLAGS: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fPIC -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 Step #3 - "compile-libfuzzer-coverage-x86_64": -- CMAKE_C_FLAGS_DEBUG: -g Step #3 - "compile-libfuzzer-coverage-x86_64": -- Linking against: /usr/lib/x86_64-linux-gnu/libm.so;/usr/lib/x86_64-linux-gnu/libz.so Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- STD_FILTERS: deflate bz2 Step #3 - "compile-libfuzzer-coverage-x86_64": -- # NetCDF C Configuration Summary Step #3 - "compile-libfuzzer-coverage-x86_64": ============================== Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": # General Step #3 - "compile-libfuzzer-coverage-x86_64": ------- Step #3 - "compile-libfuzzer-coverage-x86_64": NetCDF Version: 4.10.0-development Step #3 - "compile-libfuzzer-coverage-x86_64": Dispatch Version: 5 Step #3 - "compile-libfuzzer-coverage-x86_64": Configured On: Tue Jun 17 06:08:04 UTC 2025 Step #3 - "compile-libfuzzer-coverage-x86_64": Host System: x86_64-Linux-5.10.0-32-cloud-amd64 Step #3 - "compile-libfuzzer-coverage-x86_64": Build Directory: Step #3 - "compile-libfuzzer-coverage-x86_64": Install Prefix: /usr/local Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": # Compiling Options Step #3 - "compile-libfuzzer-coverage-x86_64": ----------------- Step #3 - "compile-libfuzzer-coverage-x86_64": C Compiler: /usr/local/bin/clang Step #3 - "compile-libfuzzer-coverage-x86_64": CFLAGS: -O1 -fno-omit-frame-pointer -gline-tables-only -Wno-error=enum-constexpr-conversion -Wno-error=incompatible-function-pointer-types -Wno-error=int-conversion -Wno-error=deprecated-declarations -Wno-error=implicit-function-declaration -Wno-error=implicit-int -Wno-error=vla-cxx-extension -DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION -fprofile-instr-generate -fcoverage-mapping -pthread -Wl,--no-as-needed -Wl,-ldl -Wl,-lm -Wno-unused-command-line-argument -fPIC -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -g Step #3 - "compile-libfuzzer-coverage-x86_64": CPPFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": LDFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": AM_CFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": AM_CPPFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": AM_LDFLAGS: Step #3 - "compile-libfuzzer-coverage-x86_64": Shared Library: no Step #3 - "compile-libfuzzer-coverage-x86_64": Static Library: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Extra libraries: -lm -lz Step #3 - "compile-libfuzzer-coverage-x86_64": XML Parser: tinyxml2 (bundled) Step #3 - "compile-libfuzzer-coverage-x86_64": Legacy Macros: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": # Features Step #3 - "compile-libfuzzer-coverage-x86_64": -------- Step #3 - "compile-libfuzzer-coverage-x86_64": Benchmarks: no Step #3 - "compile-libfuzzer-coverage-x86_64": NetCDF-2 API: yes Step #3 - "compile-libfuzzer-coverage-x86_64": HDF4 Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": HDF5 Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": CDF5 Support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": NC-4 Parallel Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": PnetCDF Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": DAP2 Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": DAP4 Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Byte-Range Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": S3 Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": S3 SDK: none Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": NCZarr Support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": NCZarr Zip Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Diskless Support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": MMap Support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": ERANGE Fill Support: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Relaxed Boundary Check: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Plugins Enabled: no Step #3 - "compile-libfuzzer-coverage-x86_64": Plugin Install Dir: /usr/local/hdf5/lib/plugin Step #3 - "compile-libfuzzer-coverage-x86_64": Plugin Search Path: /usr/local/hdf5/lib/plugin:/usr/local/hdf5/lib/plugin Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Quantization: yes Step #3 - "compile-libfuzzer-coverage-x86_64": Logging: no Step #3 - "compile-libfuzzer-coverage-x86_64": SZIP Write Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Standard Filters: deflate bz2 Step #3 - "compile-libfuzzer-coverage-x86_64": ZSTD Support: no Step #3 - "compile-libfuzzer-coverage-x86_64": Parallel Filters: no Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": CMake Warning at CMakeLists.txt:1800 (message): Step #3 - "compile-libfuzzer-coverage-x86_64": Warning! Deprecated Options used. Please migrate your build system as Step #3 - "compile-libfuzzer-coverage-x86_64": follows: Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": o ENABLE_DAP --> NETCDF_ENABLE_DAP Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": o ENABLE_HDF5 --> NETCDF_ENABLE_HDF5 Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": -- Configuring done (9.5s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Generating done (0.2s) Step #3 - "compile-libfuzzer-coverage-x86_64": -- Build files have been written to: /src/netcdf-c/build Step #3 - "compile-libfuzzer-coverage-x86_64": ++ nproc Step #3 - "compile-libfuzzer-coverage-x86_64": + make -j32 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 0%] Generating putget.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Generating attr.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Generating ncx.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Building C object libnczarr/CMakeFiles/nczarr.dir/zarr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4attr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 1%] Building C object libnczarr/CMakeFiles/nczarr.dir/zxcache.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 2%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4dispatch.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4dim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object libnczarr/CMakeFiles/nczarr.dir/zattr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 3%] Building C object libnczarr/CMakeFiles/nczarr.dir/zchunking.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4grp.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4internal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building C object libnczarr/CMakeFiles/nczarr.dir/zcreate.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 4%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4type.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building C object libdispatch/CMakeFiles/dispatch.dir/dcopy.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 5%] Building C object libnczarr/CMakeFiles/nczarr.dir/zclose.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4var.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building C object libdispatch/CMakeFiles/dispatch.dir/dfile.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 6%] Building C object libnczarr/CMakeFiles/nczarr.dir/zcvt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object libdispatch/CMakeFiles/dispatch.dir/ddim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object libsrc4/CMakeFiles/netcdf4.dir/ncfunc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 7%] Building C object libdispatch/CMakeFiles/dispatch.dir/dattinq.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building C object libdispatch/CMakeFiles/dispatch.dir/dattput.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building C object libdispatch/CMakeFiles/dispatch.dir/datt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 8%] Building C object libdispatch/CMakeFiles/dispatch.dir/dattget.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building C object libnczarr/CMakeFiles/nczarr.dir/zdim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building C object libsrc4/CMakeFiles/netcdf4.dir/ncindex.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 9%] Building C object libdispatch/CMakeFiles/dispatch.dir/derror.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object libdispatch/CMakeFiles/dispatch.dir/dvar.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object libdispatch/CMakeFiles/dispatch.dir/dvarget.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object libdispatch/CMakeFiles/dispatch.dir/dvarput.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object libnczarr/CMakeFiles/nczarr.dir/zdispatch.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Building C object libnczarr/CMakeFiles/nczarr.dir/zfile.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 10%] Built target manpage Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building C object libsrc4/CMakeFiles/netcdf4.dir/nc4cache.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 11%] Building C object libsrc/CMakeFiles/netcdf3.dir/v1hpg.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 12%] Building C object libsrc/CMakeFiles/netcdf3.dir/putget.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building C object libdispatch/CMakeFiles/dispatch.dir/dvarinq.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 13%] Building C object libdispatch/CMakeFiles/dispatch.dir/ddispatch.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/dfile.c:1869:14: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 1869 | path = nulldup((const char*)p); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/dfile.c:2018:14: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 2018 | path = nulldup(p); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 14%] Building C object libdispatch/CMakeFiles/dispatch.dir/dstring.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object libnczarr/CMakeFiles/nczarr.dir/zgrp.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object libnczarr/CMakeFiles/nczarr.dir/zinternal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object libdispatch/CMakeFiles/dispatch.dir/nclog.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 15%] Building C object libnczarr/CMakeFiles/nczarr.dir/zmap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object libnczarr/CMakeFiles/nczarr.dir/zmap_file.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object libnczarr/CMakeFiles/nczarr.dir/zodom.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object libnczarr/CMakeFiles/nczarr.dir/zopen.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object libsrc/CMakeFiles/netcdf3.dir/attr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 16%] Building C object libsrc/CMakeFiles/netcdf3.dir/nc3dispatch.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object libnczarr/CMakeFiles/nczarr.dir/zprov.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object libnczarr/CMakeFiles/nczarr.dir/zsync.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object libnczarr/CMakeFiles/nczarr.dir/ztype.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 17%] Building C object libnczarr/CMakeFiles/nczarr.dir/zutil.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object libnczarr/CMakeFiles/nczarr.dir/zvar.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object libnczarr/CMakeFiles/nczarr.dir/zwalk.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object libdispatch/CMakeFiles/dispatch.dir/dutf8.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object libnczarr/CMakeFiles/nczarr.dir/zdebug.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 18%] Building C object libdispatch/CMakeFiles/dispatch.dir/dinternal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building C object libdispatch/CMakeFiles/dispatch.dir/doffsets.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncuri.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 19%] Building C object libdispatch/CMakeFiles/dispatch.dir/nclist.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncbytes.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 20%] Building C object libdispatch/CMakeFiles/dispatch.dir/nchashmap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building C object libdispatch/CMakeFiles/dispatch.dir/nc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 21%] Building C object libdispatch/CMakeFiles/dispatch.dir/nctime.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building C object libsrc/CMakeFiles/netcdf3.dir/nc3internal.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building C object libdispatch/CMakeFiles/dispatch.dir/utf8proc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 22%] Building C object libsrc/CMakeFiles/netcdf3.dir/var.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object libdispatch/CMakeFiles/dispatch.dir/dpathmgr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object libdispatch/CMakeFiles/dispatch.dir/nclistmgr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object libdispatch/CMakeFiles/dispatch.dir/dutil.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/ncuri.c:584:41: warning: passing 'const char *' to parameter of type 'void *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 584 | nclistset(duri->fraglist,(size_t)pos+1,nulldup(value)); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/include/ncconfigure.h:133:20: note: expanded from macro 'nulldup' Step #3 - "compile-libfuzzer-coverage-x86_64": 133 | #define nulldup(s) ((s)==NULL?s:strdup(s)) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/include/nclist.h:31:43: note: passing argument to parameter here Step #3 - "compile-libfuzzer-coverage-x86_64": 31 | EXTERNL int nclistset(NClist*,size_t,void*); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 23%] Building C object libsrc/CMakeFiles/netcdf3.dir/dim.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/ncuri.c:631:42: warning: passing 'const char *' to parameter of type 'void *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 631 | nclistset(duri->querylist,(size_t)pos+1,nulldup(value)); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/include/ncconfigure.h:133:20: note: expanded from macro 'nulldup' Step #3 - "compile-libfuzzer-coverage-x86_64": 133 | #define nulldup(s) ((s)==NULL?s:strdup(s)) Step #3 - "compile-libfuzzer-coverage-x86_64": | [ 24%] Building C object libsrc/CMakeFiles/netcdf3.dir/ncx.c.o Step #3 - "compile-libfuzzer-coverage-x86_64":  ^~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/include/nclist.h:31:43: note: passing argument to parameter here Step #3 - "compile-libfuzzer-coverage-x86_64": 31 | EXTERNL int nclistset(NClist*,size_t,void*); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building C object libsrc/CMakeFiles/netcdf3.dir/lookup3.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/nc.c:91:15: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": [ 24%] Building C object libsrc/CMakeFiles/netcdf3.dir/ncio.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 91 | ncp->path = nulldup(path); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object libsrc/CMakeFiles/netcdf3.dir/memio.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object libdispatch/CMakeFiles/dispatch.dir/drc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object libsrc/CMakeFiles/netcdf3.dir/mmapio.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 25%] Building C object libdispatch/CMakeFiles/dispatch.dir/dauth.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:3176:12: warning: implicit conversion from 'long long' to 'float' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3176 | if (xx == LONGLONG_MAX) *ip = LONGLONG_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:65:22: note: expanded from macro 'LONGLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 65 | #define LONGLONG_MAX LONG_LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:62:23: note: expanded from macro 'LONG_LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define LONG_LONG_MAX LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372[ 26%] Building C object libdispatch/CMakeFiles/dispatch.dir/dreadonly.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:3238[ 26%] Building C object libdispatch/CMakeFiles/dispatch.dir/dnotnc4.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": :12: warning: implicit conversion from 'unsigned long long' to 'float' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3238 | if (xx == ULONGLONG_MAX) *ip = ULONGLONG_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:77:23: note: expanded from macro 'ULONGLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 77 | #define ULONGLONG_MAX ULONG_LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:74:24: note: expanded from macro 'ULONG_LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 74 | #define ULONG_LONG_MAX ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 26%] Building C object libdispatch/CMakeFiles/dispatch.dir/dnotnc3.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:3747:12: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3747 | if (xx == LONGLONG_MAX) *ip = LONGLONG_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:65:22: note: expanded from macro 'LONGLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 65 | #define LONGLONG_MAX LONG_LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:62:23: note: expanded from macro 'LONG_LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define LONG_LONG_MAX LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:3809:12: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3809 | if (xx == ULONGLONG_MAX) *ip = ULONGLONG_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:77:23: note: expanded from macro 'ULONGLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 77 | #define ULONGLONG_MAX ULONG_LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:74:24: note: expanded from macro 'ULONG_LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 74 | #define ULONG_LONG_MAX ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MA[ 27%] Building C object libdispatch/CMakeFiles/dispatch.dir/dinfermodel.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": X__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 27%] Building C object libsrc/CMakeFiles/netcdf3.dir/posixio.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:4607:15: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4607 | [ 27%] Building C object libdispatch/CMakeFiles/dispatch.dir/daux.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": if (*ip > X_INT64_MAX || *ip < X_INT64_MIN) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libsrc/ncx.h:107:21: /src/netcdf-c/libdispatch/drc.c:note: 701:21: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 701 | entry->host = expanded from macro 'X_INT64_MAX'nu Step #3 - "compile-libfuzzer-coverage-x86_64": lldup(hostport); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  107 | #define X_INT64_MAX 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/drc.c:703:24: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 703 | entry->urlpath = nulldup(urlpath); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 27%] Building C object libdispatch/CMakeFiles/dispatch.dir/dinstance.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/libsrc/ncx.c:5230:15: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 5230 | if (*ip > X_UINT64_MAX || *ip < 0) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libsrc/ncx.h:108:22: note: expanded from macro 'X_UINT64_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 108 | #define X_UINT64_MAX 18446744073709551615ULL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object libdispatch/CMakeFiles/dispatch.dir/dinstance_intern.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object libdispatch/CMakeFiles/dispatch.dir/dcrc32.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 28%] Building C object libdispatch/CMakeFiles/dispatch.dir/dcrc64.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncexhash.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncxcache.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 29%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncjson.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building C object libdispatch/CMakeFiles/dispatch.dir/ds3util.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building C object libdispatch/CMakeFiles/dispatch.dir/dparallel.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 30%] Building C object libdispatch/CMakeFiles/dispatch.dir/dmissing.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building C object libdispatch/CMakeFiles/dispatch.dir/ncproplist.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building C object libdispatch/CMakeFiles/dispatch.dir/dgroup.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 31%] Building C object libdispatch/CMakeFiles/dispatch.dir/dvlen.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building C object libdispatch/CMakeFiles/dispatch.dir/dcompound.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/daux.c:1151:29: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 1151 | dirs->dirs[dirs->ndirs] = nulldup(dir); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/daux.c:1181:19: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 1181 | dirs->dirs[0] = nulldup(dir); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/ncjson.c:655:12: warning: returning 'const NCjson *' (aka 'const struct NCjson *') from a function with result type 'NCjson *' (aka 'struct NCjson *') discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 655 | return jvalue; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building C object libdispatch/CMakeFiles/dispatch.dir/dtype.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 32%] Building C object libdispatch/CMakeFiles/dispatch.dir/denum.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object libdispatch/CMakeFiles/dispatch.dir/dopaque.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/ds3util.c:202:9: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 202 | region = nulldup(region0); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object libdispatch/CMakeFiles/dispatch.dir/dfilter.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 33%] Building C object libdispatch/CMakeFiles/dispatch.dir/dplugins.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Building C object libdispatch/CMakeFiles/dispatch.dir/dv2i.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/libdispatch/dplugins.c:224:16: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 224 | dirs->dirs[i] = nulldup(dir); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 2 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Built target netcdf4 Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Built target nczarr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Built target dispatch Step #3 - "compile-libfuzzer-coverage-x86_64": 6 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 34%] Built target netcdf3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Building C object CMakeFiles/netcdf.dir/liblib/nc_initialize.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Linking C static library libnetcdf.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Built target netcdf Step #3 - "compile-libfuzzer-coverage-x86_64": [ 35%] Building C object libdispatch/CMakeFiles/ncrandom.dir/ncrandom.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building C object ncgen3/CMakeFiles/ncgen3.dir/main.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 36%] Building C object ncgen/CMakeFiles/ncgen.dir/bindata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object ncgen3/CMakeFiles/ncgen3.dir/load.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object ncgen/CMakeFiles/ncgen.dir/bytebuffer.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object ncdump/CMakeFiles/ncdump.dir/vardata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 37%] Building C object ncdump/CMakeFiles/ncdump.dir/ncdump.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building C object ncgen/CMakeFiles/ncgen.dir/cdata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building C object ncdump/CMakeFiles/ncvalidator.dir/ncvalidator.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 38%] Building C object ncgen3/CMakeFiles/ncgen3.dir/escapes.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object ncdump/CMakeFiles/ncpathcvt.dir/ncpathcvt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object ncdump/CMakeFiles/ncdump.dir/dumplib.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object ncgen3/CMakeFiles/ncgen3.dir/getfill.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object ncgen3/CMakeFiles/ncgen3.dir/init.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 40%] Building C object ncdump/CMakeFiles/ncdump.dir/indent.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building C object ncgen/CMakeFiles/ncgen.dir/cvt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building C object ncdump/CMakeFiles/ncfilteravail.dir/ncfilteravail.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 41%] Building C object ncdump/CMakeFiles/ncdump.dir/nctime0.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncgen/CMakeFiles/ncgen.dir/data.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/nccopy.dir/nccopy.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/nccopy.dir/nciter.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/echon.dir/echon.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncgen3/CMakeFiles/ncgen3.dir/genlib.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/bom.dir/bom.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/rewrite-scalar.dir/rewrite-scalar.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 42%] Building C object ncdump/CMakeFiles/nctrunc.dir/nctrunc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object ncdump/CMakeFiles/tst_fillbug.dir/tst_fillbug.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object ncdump/CMakeFiles/tst_utf8.dir/tst_utf8.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 43%] Building C object ncdump/CMakeFiles/tst_dimsizes.dir/tst_dimsizes.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building C object ncdump/CMakeFiles/ref_ctest64.dir/ref_ctest64.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building C object ncdump/CMakeFiles/ref_ctest.dir/ref_ctest.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Building C object nctest/CMakeFiles/nctest.dir/add.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 44%] Linking C executable ncrandom Step #3 - "compile-libfuzzer-coverage-x86_64": [ 45%] Building C object ncdump/CMakeFiles/nccopy.dir/chunkspec.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Linking C executable bom Step #3 - "compile-libfuzzer-coverage-x86_64": [ 46%] Building C object ncgen/CMakeFiles/ncgen.dir/debug.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building C object ncdump/CMakeFiles/ncdump.dir/utils.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 47%] Building C object ncdump/CMakeFiles/nccopy.dir/utils.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Linking C executable rewrite-scalar Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Linking C executable nctrunc Step #3 - "compile-libfuzzer-coverage-x86_64": [ 48%] Linking C executable echon Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Linking C executable ncfilteravail Step #3 - "compile-libfuzzer-coverage-x86_64": [ 49%] Linking C executable tst_utf8 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Building C object nctest/CMakeFiles/nctest.dir/atttests.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Built target ncrandom Step #3 - "compile-libfuzzer-coverage-x86_64": [ 50%] Built target bom Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building C object ncgen/CMakeFiles/ncgen.dir/escapes.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 51%] Building C object nctest/CMakeFiles/nctest.dir/cdftests.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Linking C executable tst_dimsizes Step #3 - "compile-libfuzzer-coverage-x86_64": [ 52%] Building C object ncgen/CMakeFiles/ncgen.dir/dump.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Linking C executable ncpathcvt Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object ncdump/CMakeFiles/ncdump.dir/nciter.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object ncdump/CMakeFiles/nccopy.dir/dimmap.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Built target nctrunc Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object ncgen/CMakeFiles/ncgen.dir/f77data.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 53%] Building C object ncgen/CMakeFiles/ncgen.dir/genbin.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Building C object ncgen/CMakeFiles/ncgen.dir/genc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 54%] Built target echon Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building C object nctest/CMakeFiles/tst_rename.dir/tst_rename.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Generating test_write.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Linking C executable tst_fillbug Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Generating test_get.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building C object ncgen/CMakeFiles/ncgen.dir/genchar.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building C object nctest/CMakeFiles/nctest.dir/dimtests.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 55%] Building C object nc_test/CMakeFiles/tst_diskless.dir/tst_diskless.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 56%] Building C object ncgen3/CMakeFiles/ncgen3.dir/ncgeny.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 57%] Building C object ncdump/CMakeFiles/nccopy.dir/list.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Generating test_put.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 58%] Building C object ncgen/CMakeFiles/ncgen.dir/generate.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building C object nc_test/CMakeFiles/tst_diskless3.dir/tst_diskless3.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Building C object nc_test/CMakeFiles/tst_diskless4.dir/tst_diskless4.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 59%] Generating test_read.c Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building C object nc_test/CMakeFiles/nc_test.dir/nc_test.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building C object nc_test/CMakeFiles/tst_diskless5.dir/tst_diskless5.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Building C object nc_test/CMakeFiles/nc_test.dir/error.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 60%] Linking C executable tst_rename Step #3 - "compile-libfuzzer-coverage-x86_64": [ 61%] Building C object nctest/CMakeFiles/nctest.dir/driver.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object ncgen/CMakeFiles/ncgen.dir/generr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object ncgen/CMakeFiles/ncgen.dir/genf77.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Built target rewrite-scalar Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object nc_test/CMakeFiles/tst_inmemory.dir/tst_inmemory.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object nc_test/CMakeFiles/tst_open_mem.dir/tst_open_mem.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object nc_test/CMakeFiles/nc_test.dir/util.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 62%] Building C object ncgen/CMakeFiles/ncgen.dir/genj.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 63%] Building C object nc_test/CMakeFiles/nc_test.dir/test_get.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building C object ncgen/CMakeFiles/ncgen.dir/genlib.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 64%] Building C object ncgen/CMakeFiles/ncgen.dir/getfill.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Linking C executable tst_diskless4 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Built target tst_utf8 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building C object nctest/CMakeFiles/nctest.dir/emalloc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Built target ncfilteravail Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building C object nc_test/CMakeFiles/nc_test_t_nc.dir/t_nc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Building C object nc_test/CMakeFiles/nc_test_tst_small.dir/tst_small.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/util.c:34:60: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Built target ncpathcvt Step #3 - "compile-libfuzzer-coverage-x86_64": [ 65%] Built target tst_dimsizes Step #3 - "compile-libfuzzer-coverage-x86_64": 34 | case NC_INT64: return value >= X_INT64_MIN && value <= X_INT64_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:84:24: note: expanded from macro 'X_INT64_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 84 | #define X_INT64_MAX LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define [ 65%] Building C object ncgen/CMakeFiles/ncgen.dir/jdata.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/util.c:35:60: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 35 | [ 66%] Building C object ncgen/CMakeFiles/ncgen.dir/list.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": case NC_UINT64: return value >= 0 && value <= X_UINT64_MAX; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:90:23: note: expanded from macro 'X_UINT64_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 90 | #define X_UINT64_MAX ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building C object nc_test/CMakeFiles/nc_test.dir/test_put.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Linking C executable tst_open_mem Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Building C object nctest/CMakeFiles/nctest.dir/error.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/util.c:370:40: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 370 | if ( r < long_min || r > lo[ 66%] Linking C executable tst_diskless3 Step #3 - "compile-libfuzzer-coverage-x86_64": ng_max ) return 2; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/util.c:395:41: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 395 | if ( r < int64_min || r > int64_max ) return 2; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX[ 66%] Linking C executable tst_diskless Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: /src/netcdf-c/build/nc_test/test_get.c:640:58expanded from macro 'LLONG_MAX': warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64":  640 | Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #def if ((expect >= long_min && expect <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": in/src/netcdf-c/nc_test/tests.h:e LLONG_MAX 170 :18_:_ LONnote: G_expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": LONG_M A170 | #X__ Step #3 - "compile-libfuzzer-coverage-x86_64": def| ine long ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/util.c:400:35: _warning: maimplicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion]x LONG Step #3 - "compile-libfuzzer-coverage-x86_64": _MAX Step #3 - "compile-libfuzzer-coverage-x86_64": 400| |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  /usr/local/lib/clang/18/include/limits.h: 47 :i19f: ( r note:  < expanded from macro 'LONG_MAX'0. Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #defi0 || rn >e uintLONG_64_maxMAX ) _ ret_uLrn ONG2_;MAX Step #3 - "compile-libfuzzer-coverage-x86_64": _ _|  ~ ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #defineM uAiXn_t_6 49223_max U372LLO036854775807LNG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~|  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLON[ 66%] Linking C executable tst_diskless5 Step #3 - "compile-libfuzzer-coverage-x86_64": G_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 66%] Built target tst_fillbug Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object nctest/CMakeFiles/nctest.dir/misctest.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object nc_test/CMakeFiles/nc_test_tst_misc.dir/tst_misc.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:136:17: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 136 | if (value > long_max) return lo[ 67%] Building C object ncgen/CMakeFiles/ncgen.dir/main.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": ng_max; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object ncgen/CMakeFiles/ncgen.dir/ncgeny.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:1170:62: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1170 | /src/netcdf-c/build/nc_test/test_put.c:231 :17:  warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion]  Step #3 - "compile-libfuzzer-coverage-x86_64": 231 | if (value > longlong_max) return longlong_max; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: if ((ex pect >= longlonote: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": ng105_min && expect <= longlon | g_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": #|  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177d:22:efin note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: eexpanded from macro 'LLONG_MAX' L Step #3 - "compile-libfuzzer-coverage-x86_64": L O105N | G#_dMeAfXi n e_ _LLLOONNGG__LMOANXG _ M_A_LOXN_G__LO Step #3 - "compile-libfuzzer-coverage-x86_64": N G| _M ^~~~~~~~~~~~~~~~~A Step #3 - "compile-libfuzzer-coverage-x86_64": X__ Step #3 - "compile-libfuzzer-coverage-x86_64":  | :62 ^~~~~~~~~~~~~~~~~: Step #3 - "compile-libfuzzer-coverage-x86_64": 27: :note: 62:expanded from macro '__LONG_LONG_MAX__'27: Step #3 - "compile-libfuzzer-coverage-x86_64":  62note: | #expanded from macro '__LONG_LONG_MAX__'de Step #3 - "compile-libfuzzer-coverage-x86_64": fi n62e | #_d_eLfOiNnGe_ L_O_NLGO_NMGA_XL_O_N G9_2M2A3X3_7_2 093262835347727053860875L4L77 Step #3 - "compile-libfuzzer-coverage-x86_64": 5 8| 07 ^~~~~~~~~~~~~~~~~~~~~L Step #3 - "compile-libfuzzer-coverage-x86_64": L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:250:17: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 250 | if (value > ulonglong_max) return ulonglong_max; Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:1276:63: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1276 | if ((expect >= ulonglong_min && expect <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object nctest/CMakeFiles/nctest.dir/slabs.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:710:108: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 710 | if (inRange3(cdf_format, (double)expect,datatype,NCT_LONG) && (expect >= long_min && expect <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 67%] Building C object nctest/CMakeFiles/nctest.dir/rec.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:1921:77: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1921 | allInIntRange &= (expect[j] >= long_min && expect[j] <= long_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:1946:116: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1946 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONG) && (expect[j] >= long_min && expect[j] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 68%] Building C object nctest/CMakeFiles/nctest.dir/val.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:1105:116: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1105 | if (inRange3(cdf_format, (double)expect,datatype,NCT_LONGLONG) && (expect >= longlong_min && expect <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:1184:118: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1184 | if (inRange3(cdf_format, (double)expect,datatype,NCT_ULONGLONG) && (expect >= ulonglong_min && expect <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:2461:81: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2461 | allInIntRange &= (expect[j] >= longlong_min && expect[j] <= longlong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:2486:124: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2486 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONGLONG) && (expect[j] >= longlong_min && expect[j] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: [ 68%] Linking C executable nc_test_tst_misc Step #3 - "compile-libfuzzer-coverage-x86_64": note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:2569:82: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2569 | allInIntRange &= (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:2594:126: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2594 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_ULONGLONG) && (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX[ 69%] Building C object ncgen/CMakeFiles/ncgen.dir/semantics.c.o Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:1671:64: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1671 | if ((expect[k] >= long_min && expect[k] <= long_max)) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:1684:121: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 1684 | if (inRange3(cdf_format, (double)expect[k],datatype,NCT_LONG) && (expect[k] >= long_min && expect[k] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Linking C executable ref_ctest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object nctest/CMakeFiles/nctest.dir/vardef.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object ncgen/CMakeFiles/ncgen.dir/util.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Built target tst_rename Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Linking C executable ref_ctest64 Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:2071:68: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2071 | if ((expect[k] >= longlong_min && expect[k] <= longlong_max)) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:2084:129: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2084 | if (inRange3(cdf_format, (double)expect[k],datatype,NCT_LONGLONG) && (expect[k] >= longlong_min && expect[k] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:2151:69: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2151 | if ((expect[k] >= ulonglong_min && expect[k] <= ulonglong_max)) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_put.c:2164:131: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 2164 | if (inRange3(cdf_format, (double)expect[k],datatype,NCT_ULONGLONG) && (expect[k] >= ulonglong_min && expect[k] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c/usr/local/lib/clang/18/include/limits.h:3722:107:43: note: expanded from macro 'ULLONG_MAX': Step #3 - "compile-libfuzzer-coverage-x86_64": 10756 | #: definwarning: eimplicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] UL Step #3 - "compile-libfuzzer-coverage-x86_64": LO 3722NG_MAX (__LONG_LONG_MAX__* | 2UL L+1UL L ) Step #3 - "compile-libfuzzer-coverage-x86_64": |  (expect[0] >= long_min && expect[0] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:3765:81: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3765 | allInIntRange &= (expect[j] >= long_min && expect[j] <= long_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:3790:120: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 3790 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONG) && (expect[j] >= long_min && expect[j] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 69%] Building C object nc_test/CMakeFiles/nc_test_tst_norm.dir/tst_norm.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building C object nc_test/CMakeFiles/nc_test_tst_names.dir/tst_names.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Linking C executable nc_test_t_nc Step #3 - "compile-libfuzzer-coverage-x86_64": [ 70%] Building C object nctest/CMakeFiles/nctest.dir/varget.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 71%] Building C object nctest/CMakeFiles/nctest.dir/vargetg.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Linking C executable tst_inmemory Step #3 - "compile-libfuzzer-coverage-x86_64": ncgen.y:1003:14: warning: assigning to 'char *' from 'const char *' discards qualifiers [-Wincompatible-pointer-types-discards-qualifiers] Step #3 - "compile-libfuzzer-coverage-x86_64": 1003 | sp->name = nulldup(sname); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^ ~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 72%] Built target tst_diskless4 Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4707:60: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4707 | (expect[0] >= longlong_min && expect[0] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4750:85: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4750 | allInIntRange &= (expect[j] >= longlong_min && expect[j] <= longlong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4775:128: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4775 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONGLONG) && (expect[j] >= longlong_min && expect[j] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define L[ 72%] Building C object nctest/CMakeFiles/nctest.dir/varput.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": LONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4904:61: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4904 | (expect[0] >= u[ 72%] Building C object nctest/CMakeFiles/nctest.dir/varputg.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": longlong_min && expe[ 73%] Building C object nctest/CMakeFiles/nctest.dir/vartests.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": ct[0] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4947:86: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4947 | allInIntRange &= (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:4972:130: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 4972 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_ULONGLONG) && (expect[j] >= ulonglong_min && expect[j] <[ 73%] Building C object nc_test/CMakeFiles/nc_test_tst_nofill.dir/tst_nofill.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": = ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Built target tst_open_mem Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Linking C executable ncvalidator Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building C object nc_test/CMakeFiles/nc_test.dir/test_read.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building C object nc_test/CMakeFiles/nc_test_tst_nofill2.dir/tst_nofill2.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Built target tst_diskless3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 73%] Building C object nctest/CMakeFiles/nctest.dir/vputget.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building C object nc_test/CMakeFiles/nc_test_tst_nofill3.dir/tst_nofill3.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Building C object nctest/CMakeFiles/nctest.dir/vputgetg.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 74%] Linking C executable nc_test_tst_names Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Built target tst_diskless5 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Linking C executable nc_test_tst_norm Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Built target tst_diskless Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building C object nc_test/CMakeFiles/nc_test_tst_meta.dir/tst_meta.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 75%] Building C object nc_test/CMakeFiles/nc_test_tst_inq_type.dir/tst_inq_type.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 76%] Building C object nc_test/CMakeFiles/nc_test.dir/test_write.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:6318:56: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 6318 | (expect[0] >= long_min && expect[0] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #defi[ 77%] Building C object nc_test/CMakeFiles/nc_test_tst_utf8_phrases.dir/tst_utf8_phrases.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": ne __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:6381:85: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 6381 | allInIntRange &= (expect[j] >= long_min && expect[j] <= long_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:6406:124: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 6406 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONG) && (expect[j] >= long_min && expect[j] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Building C object nc_test/CMakeFiles/nc_test_tst_global_fillval.dir/tst_global_fillval.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 77%] Built target ncvalidator Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building C object nc_test/CMakeFiles/nc_test_tst_max_var_dims.dir/tst_max_var_dims.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 79%] Building C object nc_test/CMakeFiles/nc_test_tst_formats.dir/tst_formats.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking C executable nc_test_tst_meta Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking C executable ncdump Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking C executable nc_test_tst_nofill2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking C executable nc_test_tst_nofill3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 80%] Linking C executable nc_test_tst_small Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building C object nc_test/CMakeFiles/nc_test_tst_def_var_fill.dir/tst_def_var_fill.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7503:60: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7503 | (expect[0] >= longlong_min && expect[0] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": 5 warnings/usr/local/lib/clang/18/include/limits.h generated. Step #3 - "compile-libfuzzer-coverage-x86_64": :105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7566:89: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7566 | allInIntRange &= (expect[j] >= longlong_min && expect[j] <= longlong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7591:132: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7591 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONGLONG) && (expect[j] >= longlong_min && expect[j] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max[ 81%] Linking C executable nc_test_tst_max_var_dims Step #3 - "compile-libfuzzer-coverage-x86_64": Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Linking C executable ncgen3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Built target nc_test_tst_misc Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Built target ref_ctest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 81%] Building C object nc_test/CMakeFiles/nc_test_tst_err_enddef.dir/tst_err_enddef.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Linking C executable nc_test_tst_global_fillval Step #3 - "compile-libfuzzer-coverage-x86_64": [ 82%] Built target nc_test_tst_meta Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7740:61: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7740 | (expect[[ 83%] Building C object examples/C/CMakeFiles/C_tests_simple_xy_rd.dir/simple_xy_rd.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building C object examples/C/CMakeFiles/C_tests_simple_xy_wr.dir/simple_xy_wr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building C object nc_test/CMakeFiles/nc_test_tst_default_format.dir/tst_default_format.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": 0] >= ulonglong_min && expect[0] <= ulonglong_max)) [ 83%] Building C object nc_test/CMakeFiles/nc_test_tst_utf8_validate.dir/tst_utf8_validate.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7803:90: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7803 | allInIntRange &= (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:7828:134: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 7828 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_ULONGLONG) && (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Linking C executable nc_test_tst_inq_type Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Linking C executable nc_test_tst_utf8_phrases Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Building C object examples/C/CMakeFiles/C_tests_sfc_pres_temp_wr.dir/sfc_pres_temp_wr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 83%] Built target ref_ctest64 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 84%] Building C object examples/C/CMakeFiles/C_tests_sfc_pres_temp_rd.dir/sfc_pres_temp_rd.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:102:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 102 | {1,"2.1.5", "5 bytes (U-00200000)", "<88><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:103:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 103 | {1,"2.1.6", "6 bytes (U-04000000)", "<84><80><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:109:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 109 | {1,"2.2.4", "4 bytes [ 84%] Linking C executable nc_test_tst_err_enddef Step #3 - "compile-libfuzzer-coverage-x86_64": (U-001FFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:110:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 110 | {1,"2.2.5", "5 bytes (U-03FFFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:111:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 111 | {1,"2.2.6", "6 bytes (U-7FFFFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:119:42: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 119 | [ 84%] Linking C executable nccopy Step #3 - "compile-libfuzzer-coverage-x86_64": {1,"2.3.5", "U-00110000 = f4 90 80 80", "<90><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:131:46: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 131 | {1,"3.1.1", "First continuation byte 0x80", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:132:46: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 132 | {1,"3.1.2", "Last continuation byte 0xbf", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:134:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 134 | {1,"3.1.3", "2 continuation bytes", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:135:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 135 | {1,"3.1.4", "3 continuation bytes", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:136:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 136 | {1,"3.1.5", "4 continuation bytes", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:137:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 137 | {1,"3.1.6", "5 continuation bytes", "<80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:138:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 138 | {1,"3.1.7", "6 continuation bytes", "<80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:139:38: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 139 | {1,"3.1.8[ 84%] Linking C executable C_tests_simple_xy_rd Step #3 - "compile-libfuzzer-coverage-x86_64": ", "7 continuation bytes", "<80><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:141:5: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 141 | "<80><81><82><83><84><85><86><87><88><89><8A><8B><8C><8D><8E><8F><90><91><92><93><94><95><96><97><98><99><9A><9B><9C><9D><9E><9F>" Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:150:2: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 150 | "                             
   " Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:156:2: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 156[ 84%] Built target nc_test_t_nc Step #3 - "compile-libfuzzer-coverage-x86_64": | "                " Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:162:5: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 162 | "        " Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ ~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:168:5: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 168 | "    " Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ ~~~~ ~~~~ ~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:174:5: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 174 | "  " Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ ~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:182:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 182 | {1,"3.3.1", "2-byte sequence with last byte missing (U+0000)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:183:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 183 | {1,"3.3.2", "3-byte sequence with last byte missing (U+0000)", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:184:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 184 | {1,"3.3.3", "4-byte sequence with last byte missing (U+0000)", "<80><80>[ 85%] Linking C executable nctest Step #3 - "compile-libfuzzer-coverage-x86_64": "}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:185:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 185 | {1,"3.3.4", "5-byte sequence with last byte missing (U+0000)", "<80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:186:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 186 | {1,"3.3.5", "6-byte sequence with last byte missing (U+0000)", "<80><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:187:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 187 | {1,"3.3.6", "2-byte sequence with last byte missing (U-000007FF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:188:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 188 | {1,"3.3.7", "3-byte sequence with last byte missing (U-0000FFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:189:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 189 | {1,"3.3.8", "4-byte sequence with last byte missing (U-001FFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:190:69: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 190 | {1,"3.3.9", "5-byte sequence with last byte missing (U-03FFFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:191:70: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 191 | {1,"3.3.10", "6-byte sequence with last byte missing (U-7FFFFFFF)", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:198:5: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 198 | [ 85%] Linking C executable nc_test_tst_def_var_fill Step #3 - "compile-libfuzzer-coverage-x86_64": "<80><80><80><80><80><80><80><80><80><80>" Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:205:20: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 205 | {1,"3.5.1", "fe", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:206:20: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 206 | {1,"3.5.2", "ff", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:207:29: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 207 | {1,"3.5.3", "fe fe ff ff", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:240:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 240 | {1,"4.1.1", "U+002F = c0 af ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:241:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 241 | {1,"4.1.2", "U+002F = e0 80 af ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:242:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 242 | {1,"4.1.3", "U+002F = f0 80 80 af ", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:243:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 243 | {1,"4.1.4/src/netcdf-c/build/nc_test/test_get.c":,9201 :"56U:+ 002warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion]F Step #3 - "compile-libfuzzer-coverage-x86_64": = f8 80 92018 | 0 8 0 af ", "  <80> <80> <80> (exp"e}c,t[ Step #3 - "compile-libfuzzer-coverage-x86_64": 0 ]| > ^~~~~~~~~~~~~~~~~~~~= Step #3 - "compile-libfuzzer-coverage-x86_64": lon/src/netcdf-c/nc_test/tst_utf8_validate.cg:_244m:i45n: & & expectwarning: [0] <=illegal character encoding in string literal [-Winvalid-source-encoding] lo Step #3 - "compile-libfuzzer-coverage-x86_64": ng_ m244a | x{)1), "4{.1 Step #3 - "compile-libfuzzer-coverage-x86_64": . 5| " ~~ ^~~~~~~~, Step #3 - "compile-libfuzzer-coverage-x86_64": "U+002F/src/netcdf-c/nc_test/tests.h :=170 :f18c :8 note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 0 80 81700 | #8d0e faifn e" ,l o"ng_<80>m<80>a<80>x<80> LO"N}G,_M Step #3 - "compile-libfuzzer-coverage-x86_64": A X|  Step #3 - "compile-libfuzzer-coverage-x86_64": ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h/src/netcdf-c/nc_test/tst_utf8_validate.c::47254::1949:: note: warning: expanded from macro 'LONG_MAX'illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64":  Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | # d254e | f{i1n,e" 4L.O2N.G1_"M,A X" U -_0_0L0O0N0G0_7MFA X=_ _c1 Step #3 - "compile-libfuzzer-coverage-x86_64": b| f ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":   : 61 : 22 : ", note: "expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": "} ,61 | Step #3 - "compile-libfuzzer-coverage-x86_64": # d| ef ^~~~~~~~i Step #3 - "compile-libfuzzer-coverage-x86_64": ne __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:9270:85: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 9270 | allInIntRange &= (expect[j] >= long_min && expect[j] <= long_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_M[ 85%] Built target tst_inmemory Step #3 - "compile-libfuzzer-coverage-x86_64": AX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:9295:124: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 9295 | /src/netcdf-c/nc_test/tst_utf8_validate.c:255:49:   warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 255 if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONG) && (expect[j] >= long_min && expect[j] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64":  | {1,"4.2.2", "U-000007FF = e0 9f bf ", "<9F>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:256:49: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 256 | {1,"4.2.3", "U-0000FFFF = f0 8f bf bf ", "<8F>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:257:49: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 257 | {1,"4.2.4", "U-001FFFFF = f8 87 bf bf bf ", "<87>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:258:49: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 258 | {1,"4.2.5", "[ 86%] Linking C executable nc_test_tst_default_format Step #3 - "compile-libfuzzer-coverage-x86_64": U-03FFFFFF = fc 83 bf bf bf bf ", "<83>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:268:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 268 | {1,"4.3[ 87%] Linking C executable nc_test_tst_nofill Step #3 - "compile-libfuzzer-coverage-x86_64": .1", "U+0000 = c0 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:269:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 269 | {1,"4.3.2", "U+0000 = e0 80 80 ", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:270:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 270 | {1,"4.3.3", "U+0000 = f0 80 80 80 ", "<80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:271:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 271 | {1,"4.3.4", "U+0000 = f8 80 80 80 80 ", "<80><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:272:45: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 272 | {1,"4.3.5", "U+0000 = fc 80 80 80 80 80 ", "<80><80><80><80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:284:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 284 | {1,"5.1.1", "U+D800 = ed a0 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:285:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 285 | {1,"5.1.2", "U+DB7F = ed ad bf ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:286:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 286 | {1,"5.1.3", "U+DB80 = ed a[ 87%] Building C object examples/C/CMakeFiles/C_tests_pres_temp_4D_wr.dir/pres_temp_4D_wr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": e 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:287:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 287 | {1,"5.1.4", "U+DBFF = ed af bf ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:288:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 288 | {1,"5.1.5", "U+DC00 = ed b0 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:289:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 289 | {1,"5.1.6", "U+DF80 = ed be 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:290:36: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 290 | {1,"5.1.7", "U+DFFF = ed bf bf ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:294:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 294 | {1,"5.2.1", "U+D800 U+DC00 = ed a0 80 ed b0 80 ", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:295:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 295 | {1,"5.2.2", "U+D800 U+DFFF = ed a0 80 ed bf bf ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:296:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 296 | {1,"5.2.3", "U+DB7F U+DC00 = ed ad bf ed b0 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:297:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 297 | {1,"5.2.4", "U+DB7F U+DFFF = ed ad bf ed bf bf ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:298:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 298 | {1,"5.2.5", "U+DB80 U+DC00 = ed ae 80 ed b0 80 ", "<80><80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c[ 87%] Built target nc_test_tst_utf8_phrases Step #3 - "compile-libfuzzer-coverage-x86_64": :299:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 299 | {1,"5.2.6", "U+DB80 U+DFFF = ed ae 80 ed bf bf ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:300:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 300 | {1,"5.2.7", "U+DBFF U+DC00 = ed af bf ed b0 80 ", "<80>"}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tst_utf8_validate.c:301:52: warning: illegal character encoding in string literal [-Winvalid-source-encoding] Step #3 - "compile-libfuzzer-coverage-x86_64": 301 | {1,"5.2.8", "U+DBFF U+DFFF = ed af bf ed bf bf ", ""}, Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Linking C executable C_tests_simple_xy_wr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building C object examples/C/CMakeFiles/C_tests_pres_temp_4D_rd.dir/pres_temp_4D_rd.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 87%] Building C object examples/C/CMakeFiles/C_tests_format.dir/format.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Linking C executable C_tests_sfc_pres_temp_wr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Building C object unit_test/CMakeFiles/unit_test_test_ncuri.dir/test_ncuri.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 88%] Linking C executable C_tests_sfc_pres_temp_rd Step #3 - "compile-libfuzzer-coverage-x86_64": 64 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Linking C executable nc_test_tst_utf8_validate Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10411:60: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10411 | (expect[0] >= longlong_min && expect[0] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10480:89: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10480 | allInIntRange &= (expect[j] >= longlong_min && expect[j] <= longlong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 89%] Built target nc_test_tst_names Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10505:132: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10505 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_LONGLONG) && (expect[j] >= longlong_min && expect[j] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Linking C executable C_tests_pres_temp_4D_rd Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Linking C executable C_tests_format Step #3 - "compile-libfuzzer-coverage-x86_64": [ 90%] Linking C executable unit_test_test_ncuri Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building C object unit_test/CMakeFiles/unit_test_test_pathcvt.dir/test_pathcvt.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Linking C executable C_tests_pres_temp_4D_wr Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10653:61: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10653 | (expect[0] >= ulonglong_min && expect[0] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10722:90: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10722 | allInIntRange &= (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:10747:134: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 10747 | if (inRange3(cdf_format, expect[j],var_type[i],NCT_ULONGLONG) && (expect[j] >= ulonglong_min && expect[j] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Linking C executable nc_test_tst_formats Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Built target nc_test_tst_norm Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Building C object nczarr_test/CMakeFiles/ut_util.dir/ut_util.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Built target nc_test_tst_utf8_validate Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:11468:81: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 11468 | allInIntRange &= (expect[k] >= long_min && expect[k] <= long_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:11490:122: warning: implicit conversion from 'long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 11490 | if (inRange3(cdf_format, expect[k],ATT_TYPE(i,j),NCT_LONG) && (expect[k] >= long_min && expect[k] <= long_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:170:18: note: expanded from macro 'long_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 170 | #define long_max LONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:47:19: note: expanded from macro 'LONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 47 | #define LONG_MAX __LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :61:22: note: expanded from macro '__LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 61 | #define __LONG_MAX__ 9223372036854775807L Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 91%] Built target nc_test_tst_nofill2 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Building C object nczarr_test/CMakeFiles/test_utils.dir/test_utils.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 92%] Built target nc_test_tst_nofill3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building C object nczarr_test/CMakeFiles/ut_util.dir/ut_test.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Building C object nczarr_test/CMakeFiles/zhex.dir/zhex.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 93%] Built target unit_test_test_ncuri Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:12083:85: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 12083 | allInIntRange &= (expect[k] >= lo[ 93%] Built target ncdump Step #3 - "compile-libfuzzer-coverage-x86_64": nglong_min && expect[k] <= longlong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": | [ 94%] Building C object fuzz/CMakeFiles/fuzz_open.dir/fuzz_open.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:12105:130: warning: implicit conversion from 'long long' to 'double' changes value from 9223372036854775807 to 9223372036854775808 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 12105 | if (inRange3(cdf_format, expect[k],ATT_TYPE(i,j),NCT_LONGLONG) && (expect[k] >= longlong_min && expect[k] <= longlong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:177:22: note: expanded from macro 'longlong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 177 | #define longlong_max int64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:176:19: note: expanded from macro 'int64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 176 | #define int64_max LLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:105:20: note: expanded from macro 'LLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 105 | #define LLONG_MAX __LONG_LONG_MAX__ Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": :62:27: note: expanded from macro '__LONG_LONG_MAX__' Step #3 - "compile-libfuzzer-coverage-x86_64": 62 | #define __LONG_LONG_MAX__ 9223372036854775807LL Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Built target nc_test_tst_small Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:12206:86: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 12206 | allInIntRange &= (expect[k] >= ulonglong_min && expect[k] <= ulonglong_max); Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/build/nc_test/test_get.c:12228:132: warning: implicit conversion from 'unsigned long long' to 'double' changes value from 18446744073709551615 to 18446744073709551616 [-Wimplicit-const-int-float-conversion] Step #3 - "compile-libfuzzer-coverage-x86_64": 12228 | if (inRange3(cdf_format, expect[k],ATT_TYPE(i,j),NCT_ULONGLONG) && (expect[k] >= ulonglong_min && expect[k] <= ulonglong_max)) { Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~ ^~~~~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:179:23: note: expanded from macro 'ulonglong_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 179 | #define ulonglong_max uint64_max Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": /src/netcdf-c/nc_test/tests.h:178:20: note: expanded from macro 'uint64_max' Step #3 - "compile-libfuzzer-coverage-x86_64": 178 | #define uint64_max ULLONG_MAX Step #3 - "compile-libfuzzer-coverage-x86_64": |  ^~~~~~~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 94%] Linking C executable unit_test_test_pathcvt Step #3 - "compile-libfuzzer-coverage-x86_64": /usr/local/lib/clang/18/include/limits.h:107:43: note: expanded from macro 'ULLONG_MAX' Step #3 - "compile-libfuzzer-coverage-x86_64": 107 | #define ULLONG_MAX (__LONG_LONG_MAX__*2ULL+1ULL) Step #3 - "compile-libfuzzer-coverage-x86_64": |  ~~~~~~~~~~~~~~~~~~~~~~^~~~~ Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Linking C executable zhex Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_global_fillval Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target ncgen3 Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_inq_type Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_max_var_dims Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Linking C executable fuzz_open Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_err_enddef Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target zhex Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_def_var_fill Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target C_tests_simple_xy_rd Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nctest Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_default_format Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target C_tests_sfc_pres_temp_wr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target C_tests_simple_xy_wr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Linking C static library libut_util.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nc_test_tst_nofill Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target C_tests_sfc_pres_temp_rd Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target nccopy Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Built target ut_util Step #3 - "compile-libfuzzer-coverage-x86_64": [ 95%] Building C object nczarr_test/CMakeFiles/ut_map.dir/ut_map.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building C object nczarr_test/CMakeFiles/ut_mapapi.dir/ut_mapapi.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building C object nczarr_test/CMakeFiles/zisjson.dir/zisjson.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 96%] Building C object nczarr_test/CMakeFiles/ut_json.dir/ut_json.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building C object nczarr_test/CMakeFiles/zmapio.dir/zmapio.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building C object nczarr_test/CMakeFiles/zs3parse.dir/zs3parse.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target C_tests_format Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target C_tests_pres_temp_4D_rd Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target nc_test_tst_formats Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Linking C static library libtest_utils.a Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target C_tests_pres_temp_4D_wr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Built target test_utils Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Linking C executable zisjson Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building C object nczarr_test/CMakeFiles/test_fillonlyz.dir/test_fillonlyz.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 97%] Building C object nczarr_test/CMakeFiles/test_quantize.dir/test_quantize.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Building C object nczarr_test/CMakeFiles/test_notzarr.dir/test_notzarr.c.o Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Built target unit_test_test_pathcvt Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Linking C executable test_notzarr Step #3 - "compile-libfuzzer-coverage-x86_64": [ 98%] Linking C executable ut_map Step #3 - "compile-libfuzzer-coverage-x86_64": [ 99%] Linking C executable zs3parse Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable ut_json Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable test_fillonlyz Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable zmapio Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable ut_mapapi Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target zs3parse Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target zisjson Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target fuzz_open Step #3 - "compile-libfuzzer-coverage-x86_64": 1 warning generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable ncgen Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target test_notzarr Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target ut_map Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target ut_json Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target test_fillonlyz Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target zmapio Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target ut_mapapi Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target ncgen Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable test_quantize Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target test_quantize Step #3 - "compile-libfuzzer-coverage-x86_64": 42 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": 12 warnings generated. Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Linking C executable nc_test Step #3 - "compile-libfuzzer-coverage-x86_64": [100%] Built target nc_test Step #3 - "compile-libfuzzer-coverage-x86_64": + cp fuzz/fuzz_open /workspace/out/libfuzzer-coverage-x86_64/ Finished Step #3 - "compile-libfuzzer-coverage-x86_64" Starting Step #4 Step #4: Pulling image: gcr.io/oss-fuzz-base/base-runner Step #4: Using default tag: latest Step #4: latest: Pulling from oss-fuzz-base/base-runner Step #4: b549f31133a9: Already exists Step #4: d4dd822bbffb: Already exists Step #4: 4d8fc000f412: Already exists Step #4: 389e1cb2b517: Pulling fs layer Step #4: e1c5f4198d9f: Pulling fs layer Step #4: 2bf8e2a82f27: Pulling fs layer Step #4: a041ea0a7870: Pulling fs layer Step #4: 2b5e29f0623e: Pulling fs layer Step #4: 6041a58f5d29: Pulling fs layer Step #4: 9ebacd20d43d: Pulling fs layer Step #4: f79bfb061366: Pulling fs layer Step #4: 646e42d39dba: Pulling fs layer Step #4: dff4be8d2817: Pulling fs layer Step #4: 8c0f3eb76529: Pulling fs layer Step #4: 93d2418a6c21: Pulling fs layer Step #4: 18f124aab1b1: Pulling fs layer Step #4: da2ebf33d422: Pulling fs layer Step #4: 178606bb99d6: Pulling fs layer Step #4: aae63a868d37: Pulling fs layer Step #4: 6ae5d3a43a91: Pulling fs layer Step #4: 3f8afd344dd7: Pulling fs layer Step #4: a2d8114ab0b1: Pulling fs layer Step #4: 7ae2d057c63f: Pulling fs layer Step #4: 4e3ece6738ea: Pulling fs layer Step #4: 9a8170f87ad2: Pulling fs layer Step #4: 174b28ee17ef: Pulling fs layer Step #4: dff4be8d2817: Waiting Step #4: 8c0f3eb76529: Waiting Step #4: aae63a868d37: Waiting Step #4: 93d2418a6c21: Waiting Step #4: 6ae5d3a43a91: Waiting Step #4: 18f124aab1b1: Waiting Step #4: 3f8afd344dd7: Waiting Step #4: da2ebf33d422: Waiting Step #4: a2d8114ab0b1: Waiting Step #4: 178606bb99d6: Waiting Step #4: a041ea0a7870: Waiting Step #4: 7ae2d057c63f: Waiting Step #4: 174b28ee17ef: Waiting Step #4: 2b5e29f0623e: Waiting Step #4: 4e3ece6738ea: Waiting Step #4: 6041a58f5d29: Waiting Step #4: 9a8170f87ad2: Waiting Step #4: 646e42d39dba: Waiting Step #4: 2bf8e2a82f27: Verifying Checksum Step #4: 2bf8e2a82f27: Download complete Step #4: 389e1cb2b517: Verifying Checksum Step #4: 389e1cb2b517: Download complete Step #4: e1c5f4198d9f: Verifying Checksum Step #4: e1c5f4198d9f: Download complete Step #4: 2b5e29f0623e: Verifying Checksum Step #4: 2b5e29f0623e: Download complete Step #4: 389e1cb2b517: Pull complete Step #4: a041ea0a7870: Verifying Checksum Step #4: a041ea0a7870: Download complete Step #4: 9ebacd20d43d: Download complete Step #4: f79bfb061366: Verifying Checksum Step #4: f79bfb061366: Download complete Step #4: e1c5f4198d9f: Pull complete Step #4: 646e42d39dba: Verifying Checksum Step #4: 646e42d39dba: Download complete Step #4: 2bf8e2a82f27: Pull complete Step #4: 6041a58f5d29: Verifying Checksum Step #4: 6041a58f5d29: Download complete Step #4: 8c0f3eb76529: Verifying Checksum Step #4: 8c0f3eb76529: Download complete Step #4: a041ea0a7870: Pull complete Step #4: 93d2418a6c21: Verifying Checksum Step #4: 93d2418a6c21: Download complete Step #4: 18f124aab1b1: Verifying Checksum Step #4: 18f124aab1b1: Download complete Step #4: 2b5e29f0623e: Pull complete Step #4: 178606bb99d6: Verifying Checksum Step #4: 178606bb99d6: Download complete Step #4: dff4be8d2817: Verifying Checksum Step #4: dff4be8d2817: Download complete Step #4: 6ae5d3a43a91: Verifying Checksum Step #4: 6ae5d3a43a91: Download complete Step #4: da2ebf33d422: Verifying Checksum Step #4: da2ebf33d422: Download complete Step #4: 3f8afd344dd7: Verifying Checksum Step #4: 3f8afd344dd7: Download complete Step #4: a2d8114ab0b1: Verifying Checksum Step #4: a2d8114ab0b1: Download complete Step #4: 7ae2d057c63f: Verifying Checksum Step #4: 7ae2d057c63f: Download complete Step #4: 9a8170f87ad2: Verifying Checksum Step #4: 9a8170f87ad2: Download complete Step #4: aae63a868d37: Verifying Checksum Step #4: aae63a868d37: Download complete Step #4: 174b28ee17ef: Download complete Step #4: 4e3ece6738ea: Verifying Checksum Step #4: 4e3ece6738ea: Download complete Step #4: 6041a58f5d29: Pull complete Step #4: 9ebacd20d43d: Pull complete Step #4: f79bfb061366: Pull complete Step #4: 646e42d39dba: Pull complete Step #4: dff4be8d2817: Pull complete Step #4: 8c0f3eb76529: Pull complete Step #4: 93d2418a6c21: Pull complete Step #4: 18f124aab1b1: Pull complete Step #4: da2ebf33d422: Pull complete Step #4: 178606bb99d6: Pull complete Step #4: aae63a868d37: Pull complete Step #4: 6ae5d3a43a91: Pull complete Step #4: 3f8afd344dd7: Pull complete Step #4: a2d8114ab0b1: Pull complete Step #4: 7ae2d057c63f: Pull complete Step #4: 4e3ece6738ea: Pull complete Step #4: 9a8170f87ad2: Pull complete Step #4: 174b28ee17ef: Pull complete Step #4: Digest: sha256:cc29b759bfedcdd8f62c66b84ca55b12b19250479d47d0eb6b8838ba1be4b806 Step #4: Status: Downloaded newer image for gcr.io/oss-fuzz-base/base-runner:latest Step #4: gcr.io/oss-fuzz-base/base-runner:latest Finished Step #4 Starting Step #5 Step #5: Already have image (with digest): gcr.io/oss-fuzz-base/base-runner Step #5: Running fuzz_open Step #5: Error occured while running fuzz_open: Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1483924465 Step #5: MERGE-OUTER: 2919 files, 0 in the initial corpus, 0 processed earlier Step #5: MERGE-OUTER: attempt 1 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1483948915 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: 2919 total files; 0 processed earlier; will process 2919 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 29Mb Step #5: #4 pulse exec/s: 0 rss: 29Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: #32 pulse exec/s: 0 rss: 30Mb Step #5: #64 pulse exec/s: 0 rss: 30Mb Step #5: #128 pulse exec/s: 0 rss: 30Mb Step #5: ==42== ERROR: libFuzzer: out-of-memory (used: 2097Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0xb9,0x9e,0xe8,0x13,0x0,0x0,0x0,0xa,0x0,0x12,0xa8,0x0,0x0,0x0,0x0,0x2,0x31,0xf,0x7a,0x1,0xa1,0x2,0x2d,0x81,0x61,0xbb,0x42,0x17, Step #5: CDF\001\271\236\350\023\000\000\000\012\000\022\250\000\000\000\000\0021\017z\001\241\002-\201a\273B\027 Step #5: artifact_prefix='./'; Test unit written to ./oom-37944f0a04a6a2fbfa71f50642f34ab2ded2a3ea Step #5: Base64: Q0RGAbme6BMAAAAKABKoAAAAAAIxD3oBoQItgWG7Qhc= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 2 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1485968201 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/37944f0a04a6a2fbfa71f50642f34ab2ded2a3ea' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 188 processed earlier; will process 2731 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 573Mb Step #5: #4 pulse exec/s: 0 rss: 1455Mb Step #5: #8 pulse exec/s: 0 rss: 1455Mb Step #5: #16 pulse exec/s: 16 rss: 1455Mb Step #5: ==45== ERROR: libFuzzer: out-of-memory (used: 2049Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0x7e,0x25,0x27,0xba,0x0,0x0,0x0,0xa,0x2,0x23,0x2b,0x8,0x7f,0xff,0xfe,0xc8,0x4c,0xc9,0x2d,0x2d,0x32,0x2d,0x2d,0x58,0x8,0xd7,0x7e,0x65, Step #5: CDF\001~%'\272\000\000\000\012\002#+\010\177\377\376\310L\311--2--X\010\327~e Step #5: artifact_prefix='./'; Test unit written to ./oom-2d0cb543b693e72e887b983351e3f08b8b589d9e Step #5: Base64: Q0RGAX4lJ7oAAAAKAiMrCH///shMyS0tMi0tWAjXfmU= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 3 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1487983320 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/2d0cb543b693e72e887b983351e3f08b8b589d9e' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 220 processed earlier; will process 2699 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 220Mb Step #5: #16 pulse exec/s: 0 rss: 757Mb Step #5: #32 pulse exec/s: 32 rss: 2081Mb Step #5: ==48== ERROR: libFuzzer: out-of-memory (used: 2081Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0x1,0xa0,0xab,0xfe,0x0,0x0,0x0,0xa,0x0,0x0,0xb,0x4e,0x5b,0x0,0x0,0x2,0x80,0x2,0x0,0xfd,0xff,0x1,0x10,0x8,0x0,0x0,0x0,0xad, Step #5: CDF\001\001\240\253\376\000\000\000\012\000\000\013N[\000\000\002\200\002\000\375\377\001\020\010\000\000\000\255 Step #5: artifact_prefix='./'; Test unit written to ./oom-bee879543197a4c01b48312dd61ad9e352e26332 Step #5: Base64: Q0RGAQGgq/4AAAAKAAALTlsAAAKAAgD9/wEQCAAAAK0= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 4 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1489998748 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/bee879543197a4c01b48312dd61ad9e352e26332' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 258 processed earlier; will process 2661 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 449Mb Step #5: ==51== ERROR: libFuzzer: out-of-memory (used: 2078Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x7a,0xb2,0x32,0x79,0xb5,0xf2,0x3a,0x66,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0xf,0xff,0xff,0x8c,0x3f,0x9,0xa4,0x8f,0x77,0x4c,0x5a,0x54, Step #5: CDF\002z\2622y\265\362:f\000\000\000\000\000\000\000\014\017\377\377\214?\011\244\217wLZT Step #5: artifact_prefix='./'; Test unit written to ./oom-8d2c785e54c6ea7f9fa9a1d218cbd960f354b7be Step #5: Base64: Q0RGAnqyMnm18jpmAAAAAAAAAAwP//+MPwmkj3dMWlQ= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 5 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1492014619 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/8d2c785e54c6ea7f9fa9a1d218cbd960f354b7be' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 290 processed earlier; will process 2629 files now Step #5: #1 pulse exec/s: 0 rss: 1758Mb Step #5: #2 pulse exec/s: 0 rss: 1758Mb Step #5: #4 pulse exec/s: 0 rss: 1758Mb Step #5: #8 pulse exec/s: 0 rss: 1758Mb Step #5: #16 pulse exec/s: 0 rss: 1758Mb Step #5: ==54== ERROR: libFuzzer: out-of-memory (used: 2078Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x7a,0xb2,0x32,0x79,0xc4,0xf4,0x3a,0x66,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0xf,0xff,0xff,0xff,0x5a,0x4c,0x9,0x84,0x54,0x77,0x3f,0x90, Step #5: CDF\002z\2622y\304\364:f\000\000\000\000\000\000\000\014\017\377\377\377ZL\011\204Tw?\220 Step #5: artifact_prefix='./'; Test unit written to ./oom-4c244534ddb42c71d471a7ec32699223bd92e1fd Step #5: Base64: Q0RGAnqyMnnE9DpmAAAAAAAAAAwP////WkwJhFR3P5A= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 6 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1494032309 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/4c244534ddb42c71d471a7ec32699223bd92e1fd' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 322 processed earlier; will process 2597 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 288Mb Step #5: #4 pulse exec/s: 0 rss: 288Mb Step #5: #8 pulse exec/s: 0 rss: 2064Mb Step #5: #16 pulse exec/s: 0 rss: 2064Mb Step #5: ==57== ERROR: libFuzzer: out-of-memory (used: 2064Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0xee,0xd,0xfe,0xad,0x45,0x96,0xc0,0xab,0x0,0x0,0x0,0x0,0xff,0xfb,0xef,0x3,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xb,0x2,0xfb,0x7e,0x32, Step #5: CDF\001\356\015\376\255E\226\300\253\000\000\000\000\377\373\357\003\000\000\000\000\000\000\000\013\002\373~2 Step #5: artifact_prefix='./'; Test unit written to ./oom-380b046abb0928b0215656ca9033fbe04ddff4a3 Step #5: Base64: Q0RGAe4N/q1FlsCrAAAAAP/77wMAAAAAAAAACwL7fjI= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 7 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1495046622 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/380b046abb0928b0215656ca9033fbe04ddff4a3' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 339 processed earlier; will process 2580 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 289Mb Step #5: #16 pulse exec/s: 0 rss: 289Mb Step #5: ==60== ERROR: libFuzzer: out-of-memory (used: 2084Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x45,0xbe,0x1,0x2e,0x0,0x0,0x0,0xa,0x0,0x67,0x1,0x13,0x0,0x0,0x0,0x4,0x3e,0xd6,0x70,0x87,0x31,0xd,0xd,0x30,0x7d,0xff,0xff,0xf9, Step #5: CDF\002E\276\001.\000\000\000\012\000g\001\023\000\000\000\004>\326p\2071\015\0150}\377\377\371 Step #5: artifact_prefix='./'; Test unit written to ./oom-dea8a6ac4cde4cbff3e03d9042fda8fc3c460056 Step #5: Base64: Q0RGAkW+AS4AAAAKAGcBEwAAAAQ+1nCHMQ0NMH3///k= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 8 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1496061748 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/dea8a6ac4cde4cbff3e03d9042fda8fc3c460056' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 367 processed earlier; will process 2552 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 2079Mb Step #5: ==63== ERROR: libFuzzer: out-of-memory (used: 2079Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0x7a,0xba,0x30,0x79,0xb5,0xf3,0x39,0x66,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0xf,0xff,0xff,0xef,0x5a,0x4c,0x9,0x8c,0x54,0x3f,0x77,0x17, Step #5: CDF\001z\2720y\265\3639f\000\000\000\000\000\000\000\014\017\377\377\357ZL\011\214T?w\027 Step #5: artifact_prefix='./'; Test unit written to ./oom-d18ec07560b4024e4c25d73d6ae13b7c72f8043b Step #5: Base64: Q0RGAXq6MHm18zlmAAAAAAAAAAwP///vWkwJjFQ/dxc= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 9 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1497077362 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/d18ec07560b4024e4c25d73d6ae13b7c72f8043b' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 387 processed earlier; will process 2532 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 825Mb Step #5: #16 pulse exec/s: 16 rss: 1456Mb Step #5: ==66== ERROR: libFuzzer: out-of-memory (used: 2079Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x30,0x3c,0x2e,0x6f,0x0,0x0,0x0,0xa,0x2,0xc4,0x44,0x62,0x7f,0xff,0xff,0xff,0xea,0xf5,0x80,0x24,0x8a,0x4c,0x30,0x70,0xd8,0x0,0xa2,0x9, Step #5: CDF\0020<.o\000\000\000\012\002\304Db\177\377\377\377\352\365\200$\212L0p\330\000\242\011 Step #5: artifact_prefix='./'; Test unit written to ./oom-ccb8c63a6737cd4bbcd875546931ce43e1c7e25e Step #5: Base64: Q0RGAjA8Lm8AAAAKAsREYn/////q9YAkikwwcNgAogk= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 10 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1500094594 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/ccb8c63a6737cd4bbcd875546931ce43e1c7e25e' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 418 processed earlier; will process 2501 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 4 rss: 2030Mb Step #5: #8 pulse exec/s: 8 rss: 2030Mb Step #5: #16 pulse exec/s: 8 rss: 2049Mb Step #5: ==69== ERROR: libFuzzer: out-of-memory (used: 2049Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x4f,0xa2,0x40,0x6b,0x0,0x0,0x0,0xa,0x2,0xfd,0xef,0x2e,0x59,0x11,0xa8,0x92,0x7e,0xa,0x7b,0x7,0xf8,0xc0,0x96,0xc2,0x83,0xb1,0x13,0x45, Step #5: CDF\002O\242@k\000\000\000\012\002\375\357.Y\021\250\222~\012{\007\370\300\226\302\203\261\023E Step #5: artifact_prefix='./'; Test unit written to ./oom-b7401266ccacb48ff2eb521e6b6d95f667e6d3b8 Step #5: Base64: Q0RGAk+iQGsAAAAKAv3vLlkRqJJ+CnsH+MCWwoOxE0U= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 11 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1503110988 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/b7401266ccacb48ff2eb521e6b6d95f667e6d3b8' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 450 processed earlier; will process 2469 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 2350Mb Step #5: ==72== ERROR: libFuzzer: out-of-memory (used: 2350Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0xe1,0xa7,0xba,0xfa,0x0,0x0,0x0,0xa,0x2,0xfe,0xe7,0xe7,0x0,0xb9,0x0,0x8,0xa,0x40,0x81,0xa0,0xc9,0xac,0x4,0x89,0xa8,0x58,0x55,0xd5, Step #5: CDF\002\341\247\272\372\000\000\000\012\002\376\347\347\000\271\000\010\012@\201\240\311\254\004\211\250XU\325 Step #5: artifact_prefix='./'; Test unit written to ./oom-8cdd04081523b8a75290c011eafc64e3fe79f033 Step #5: Base64: Q0RGAuGnuvoAAAAKAv7n5wC5AAgKQIGgyawEiahYVdU= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 12 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1504125836 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/8cdd04081523b8a75290c011eafc64e3fe79f033' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 461 processed earlier; will process 2458 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 32Mb Step #5: #4 pulse exec/s: 0 rss: 32Mb Step #5: #8 pulse exec/s: 0 rss: 32Mb Step #5: ==75== ERROR: libFuzzer: out-of-memory (used: 2064Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x30,0xe3,0x91,0x8f,0x0,0x0,0x0,0xa,0x1,0xfd,0xff,0x77,0x0,0x0,0x0,0x3,0x4c,0xda,0x21,0x71,0xd4,0x9,0xde,0x25,0x1d,0x9b,0x79,0xf1, Step #5: CDF\0020\343\221\217\000\000\000\012\001\375\377w\000\000\000\003L\332!q\324\011\336%\035\233y\361 Step #5: artifact_prefix='./'; Test unit written to ./oom-c2de0f8caf30e17ba96751c67d38ffae07479389 Step #5: Base64: Q0RGAjDjkY8AAAAKAf3/dwAAAANM2iFx1AneJR2befE= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 13 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1505142061 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/c2de0f8caf30e17ba96751c67d38ffae07479389' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 471 processed earlier; will process 2448 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 814Mb Step #5: #4 pulse exec/s: 0 rss: 814Mb Step #5: #8 pulse exec/s: 0 rss: 2078Mb Step #5: ==78== ERROR: libFuzzer: out-of-memory (used: 2078Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0x7e,0x25,0x27,0xbe,0x0,0x0,0x0,0xa,0x2,0x24,0x1a,0x49,0x7f,0xff,0xff,0xc8,0xcc,0xc9,0x2d,0x2d,0x2d,0x2d,0xc0,0xad,0xc0,0xb1,0xd7,0x2d,0x48,0x7,0x7f, Step #5: CDF\001~%'\276\000\000\000\012\002$\032I\177\377\377\310\314\311----\300\255\300\261\327-H\007\177 Step #5: artifact_prefix='./'; Test unit written to ./oom-9591826cfb8bf5a2519f6d793099f49492b2f521 Step #5: Base64: Q0RGAX4lJ74AAAAKAiQaSX///8jMyS0tLS3ArcCx1y1IB38= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 14 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1506157624 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/9591826cfb8bf5a2519f6d793099f49492b2f521' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 484 processed earlier; will process 2435 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: ==81== ERROR: libFuzzer: out-of-memory (used: 2621Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x78,0x86,0xf2,0x11,0xfb,0xcb,0x5f,0x4a,0xd9,0xd4,0x4c,0xa,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x20,0x0,0x0,0x0,0x4,0x0,0x24,0x69,0x0,0x0,0xa,0x2a,0x89,0xf9,0x81,0x12, Step #5: CDF\005x\206\362\021\373\313_J\331\324L\012\000\000\000\000\000\000\000\000\000\000\000\014 \000\000\000\004\000$i\000\000\012*\211\371\201\022 Step #5: artifact_prefix='./'; Test unit written to ./oom-81cfd8b465044ae43f7d1e8c23eb4f34efbbecbe Step #5: Base64: Q0RGBXiG8hH7y19K2dRMCgAAAAAAAAAAAAAADCAAAAAEACRpAAAKKon5gRI= Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 15 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1507178371 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/81cfd8b465044ae43f7d1e8c23eb4f34efbbecbe' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 507 processed earlier; will process 2412 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 31Mb Step #5: #8 pulse exec/s: 0 rss: 34Mb Step #5: #16 pulse exec/s: 0 rss: 34Mb Step #5: #32 pulse exec/s: 0 rss: 51Mb Step #5: #64 pulse exec/s: 64 rss: 579Mb Step #5: #128 pulse exec/s: 64 rss: 1598Mb Step #5: ==84== ERROR: libFuzzer: out-of-memory (used: 2425Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x2,0x73,0x73,0xad,0xe7,0x0,0x0,0x0,0xa,0x2,0xfc,0x31,0xcc,0x0,0x0,0x0,0x2,0xff,0xff,0x0,0xa,0x2,0xfc,0xce,0x6a,0x0,0x0,0x0,0x1,0xff,0x5a,0x4,0x40,0x1f,0x1,0x79,0x7f,0x0,0x31,0x0,0x1,0x0,0x8b,0xab,0x71, Step #5: CDF\002ss\255\347\000\000\000\012\002\3741\314\000\000\000\002\377\377\000\012\002\374\316j\000\000\000\001\377Z\004@\037\001y\177\0001\000\001\000\213\253q Step #5: artifact_prefix='./'; Test unit written to ./oom-c4cad3137173ab92f79f571977a29c562322dac5 Step #5: Base64: Q0RGAnNzrecAAAAKAvwxzAAAAAL//wAKAvzOagAAAAH/WgRAHwF5fwAxAAEAi6tx Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 16 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1513194025 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/c4cad3137173ab92f79f571977a29c562322dac5' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 713 processed earlier; will process 2206 files now Step #5: #1 pulse exec/s: 0 rss: 75Mb Step #5: #2 pulse exec/s: 0 rss: 75Mb Step #5: #4 pulse exec/s: 0 rss: 1150Mb Step #5: #8 pulse exec/s: 0 rss: 1150Mb Step #5: ==87== ERROR: libFuzzer: out-of-memory (used: 4750Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x44,0xff,0x0,0xe9,0x1,0x7d,0x70,0x77,0x0,0x0,0x0,0xa,0x0,0x0,0x0,0x0,0x0,0x53,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf5,0xd9,0x9f,0x20,0x6f,0x52,0xac,0xd1,0x0,0x0,0x4,0x0,0xff,0xf,0x2,0x0, Step #5: CDF\005D\377\000\351\001}pw\000\000\000\012\000\000\000\000\000S\300\321\000\000\000\000\000\000\000\000\365\331\237 oR\254\321\000\000\004\000\377\017\002\000 Step #5: artifact_prefix='./'; Test unit written to ./oom-497bb94cf6c971d4fc9a6371f2a6b95021f1a4f3 Step #5: Base64: Q0RGBUT/AOkBfXB3AAAACgAAAAAAU8DRAAAAAAAAAAD12Z8gb1Ks0QAABAD/DwIA Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 17 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1515221880 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/497bb94cf6c971d4fc9a6371f2a6b95021f1a4f3' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 722 processed earlier; will process 2197 files now Step #5: #1 pulse exec/s: 0 rss: 32Mb Step #5: #2 pulse exec/s: 0 rss: 48Mb Step #5: #4 pulse exec/s: 0 rss: 48Mb Step #5: #8 pulse exec/s: 0 rss: 53Mb Step #5: #16 pulse exec/s: 0 rss: 1177Mb Step #5: #32 pulse exec/s: 32 rss: 1886Mb Step #5: #64 pulse exec/s: 32 rss: 1886Mb Step #5: #128 pulse exec/s: 32 rss: 1886Mb Step #5: #256 pulse exec/s: 51 rss: 2403Mb Step #5: ==90== ERROR: libFuzzer: out-of-memory (used: 2403Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x43,0xfe,0xff,0xdf,0xe6,0x7c,0xc2,0x77,0x0,0x0,0x0,0xa,0x0,0x0,0x0,0x0,0x2,0x74,0xc0,0xac,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf8,0xd9,0x9d,0x20,0x1,0x52,0xbf,0xd2,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xb,0xf9,0xd9,0x97,0x1a,0x1,0xd1,0xc0,0x8,0x0,0x2,0xd1,0x0,0x11,0xff,0xff,0x64, Step #5: CDF\005C\376\377\337\346|\302w\000\000\000\012\000\000\000\000\002t\300\254\000\000\000\000\000\000\000\000\370\331\235 \001R\277\322\000\000\000\000\000\000\000\013\371\331\227\032\001\321\300\010\000\002\321\000\021\377\377d Step #5: artifact_prefix='./'; Test unit written to ./oom-f5fa067e9a9be9fde37e28def670cf8081f53514 Step #5: Base64: Q0RGBUP+/9/mfMJ3AAAACgAAAAACdMCsAAAAAAAAAAD42Z0gAVK/0gAAAAAAAAAL+dmXGgHRwAgAAtEAEf//ZA== Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 18 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1521238547 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/f5fa067e9a9be9fde37e28def670cf8081f53514' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1045 processed earlier; will process 1874 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: #32 pulse exec/s: 0 rss: 38Mb Step #5: ==93== ERROR: libFuzzer: out-of-memory (used: 2742Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x44,0xff,0x0,0xe9,0x1,0x7d,0x70,0x77,0x0,0x0,0x0,0xa,0x0,0x0,0x0,0x0,0x0,0x53,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x1f,0x6f,0x52,0xac,0xd1,0x0,0x0,0x4,0x0,0xff,0x10,0x2,0x0, Step #5: CDF\005D\377\000\351\001}pw\000\000\000\012\000\000\000\000\000S\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237\037oR\254\321\000\000\004\000\377\020\002\000 Step #5: artifact_prefix='./'; Test unit written to ./oom-68e00d4168fcc2cdd593493adeba6836f7191723 Step #5: Base64: Q0RGBUT/AOkBfXB3AAAACgAAAAAAU8DRAAAAAAAAAAD52Z8gAVLA0QAAAAAAAAAA+dmfH29SrNEAAAQA/xACAA== Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 19 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1522259196 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/68e00d4168fcc2cdd593493adeba6836f7191723' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1108 processed earlier; will process 1811 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: #32 pulse exec/s: 0 rss: 1317Mb Step #5: #64 pulse exec/s: 64 rss: 2084Mb Step #5: #128 pulse exec/s: 128 rss: 2084Mb Step #5: munmap_chunk(): invalid pointer Step #5: ==96== ERROR: libFuzzer: deadly signal Step #5: #0 0x55a1f85ed064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x55a1f856c0b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x55a1f854f453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7f0402f0441f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7f0402cfe00a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7f0402cdd858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7f0402d48265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7f0402d502fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7f0402d5054b (/lib/x86_64-linux-gnu/libc.so.6+0x9554b) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x55a1f86676d0 in free_NC_attr /src/netcdf-c/build/libsrc/attr.c:33:2 Step #5: #10 0x55a1f864d29b in v1h_get_NC_attr /src/netcdf-c/libsrc/v1hpg.c:775:3 Step #5: #11 0x55a1f864d29b in v1h_get_NC_attrarray /src/netcdf-c/libsrc/v1hpg.c:902:13 Step #5: #12 0x55a1f864cdf9 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1549:11 Step #5: #13 0x55a1f8604d0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #14 0x55a1f85edf58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #15 0x55a1f85ee053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #16 0x55a1f85ed496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #17 0x55a1f8550960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #18 0x55a1f8559f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #19 0x55a1f85414e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #20 0x55a1f856c912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #21 0x7f0402cdf082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #22 0x55a1f8533dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0xa,0x86,0x5,0xa,0x0,0x0,0x1,0xda,0x10,0x41,0x5,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x20,0x0,0x0,0x0,0x1,0x3f,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x1,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xe2,0x7a,0x0,0x0,0x0,0x10,0xa,0xcd,0xac,0xa, Step #5: CDF\005\012\206\005\012\000\000\001\332\020A\005\377\000\000\000\000\000\000\000\000\000\000\000\014 \000\000\000\001?\000\000\000\000\000\000\000\000\000\000\000\000\000\001\377\377\377\377\377\377\377\342z\000\000\000\020\012\315\254\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-433cfa22bc5ebd3b0bc7d7248b21cb80c793c84d Step #5: Base64: Q0RGBQqGBQoAAAHaEEEF/wAAAAAAAAAAAAAADCAAAAABPwAAAAAAAAAAAAAAAAAB/////////+J6AAAAEArNrAo= Step #5: MERGE-OUTER: attempt 20 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1524687597 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/433cfa22bc5ebd3b0bc7d7248b21cb80c793c84d' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1248 processed earlier; will process 1671 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 40Mb Step #5: free(): invalid next size (fast) Step #5: ==100== ERROR: libFuzzer: deadly signal Step #5: #0 0x558f79361064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x558f792e00b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x558f792c3453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7f90642fb41f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7f90640f500a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7f90640d4858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7f906413f265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7f90641472fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7f9064148bab (/lib/x86_64-linux-gnu/libc.so.6+0x96bab) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x558f79361eab in NC_open /src/netcdf-c/libdispatch/dfile.c:2187:5 Step #5: #10 0x558f79362053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #11 0x558f79361496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #12 0x558f792c4960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #13 0x558f792cdf30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #14 0x558f792b54e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #15 0x558f792e0912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #16 0x7f90640d6082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #17 0x558f792a7dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0xaf,0xdd,0x5,0xb,0x2d,0x8,0x50,0x0,0x0,0x8,0x9b,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x76,0x8,0x0,0x1d,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xb,0x0,0x0,0x0,0x0,0x0,0xf7,0xaf,0x1f,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x1,0x41,0x26,0xff,0x53,0xff,0xff,0xdf,0xc6,0x2e,0xfe,0x8d,0xaa,0xfb,0x30,0x3f,0x3a,0xb,0x2f,0xae,0x2d,0xed,0xba,0x60,0x30, Step #5: CDF\005\257\335\005\013-\010P\000\000\010\233\000\000\000\000\000\000\000\000\000v\010\000\035\000\000\000\000\000\000\000\000\000\000\000\013\000\000\000\000\000\367\257\037\000\000\000\000\000\000\000\001A&\377S\377\377\337\306.\376\215\252\3730?:\013/\256-\355\272`0 Step #5: artifact_prefix='./'; Test unit written to ./crash-608302687fa93c610e7d43805dfba1ecd68749b7 Step #5: Base64: Q0RGBa/dBQstCFAAAAibAAAAAAAAAAAAdggAHQAAAAAAAAAAAAAACwAAAAAA968fAAAAAAAAAAFBJv9T///fxi7+jar7MD86Cy+uLe26YDA= Step #5: MERGE-OUTER: attempt 21 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1525854424 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/608302687fa93c610e7d43805dfba1ecd68749b7' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1257 processed earlier; will process 1662 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 33Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==104==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000000000000 (pc 0x56383f60476a bp 0x7ffc5b989370 sp 0x7ffc5b989370 T104) Step #5: ==104==The signal is caused by a WRITE memory access. Step #5: ==104==Hint: address points to the zero page. Step #5: #0 0x56383f60476a in ncx_get_longlong_int /src/netcdf-c/build/libsrc/ncx.c Step #5: #1 0x56383f60476a in ncx_getn_longlong_int /src/netcdf-c/build/libsrc/ncx.c:18022:23 Step #5: #2 0x56383f63d686 in v1h_get_NC_var /src/netcdf-c/libsrc/v1hpg.c:1044:12 Step #5: #3 0x56383f63d686 in v1h_get_NC_vararray /src/netcdf-c/libsrc/v1hpg.c:1207:13 Step #5: #4 0x56383f63ce19 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1553:11 Step #5: #5 0x56383f5f4d0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #6 0x56383f5ddf58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #7 0x56383f5de053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #8 0x56383f5dd496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #9 0x56383f540960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #10 0x56383f549f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #11 0x56383f5314e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #12 0x56383f55c912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #13 0x7fb7aa9f9082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #14 0x56383f523dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: ncx_get_longlong_int--ncx_getn_longlong_int--v1h_get_NC_var Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/netcdf-c/build/libsrc/ncx.c in ncx_get_longlong_int Step #5: ==104==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0xf6,0xf9,0x56,0xa5,0x0,0xb2,0x5f,0xd,0x4,0x0,0x77,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xb,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x7c,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x3,0x30,0xdd,0x85,0xfe,0xff,0xff,0xf3,0xff,0xd0,0x54,0xef,0x9,0xff,0x29,0x4c,0xc,0x3,0x2,0xfb,0xc,0xd,0x5f,0x0,0x5, Step #5: CDF\005\366\371V\245\000\262_\015\004\000w\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\013\000\000\000\000\000\000\000|\000\000\000\000\000\000\000\0030\335\205\376\377\377\363\377\320T\357\011\377)L\014\003\002\373\014\015_\000\005 Step #5: artifact_prefix='./'; Test unit written to ./crash-b62ba7498b24599df994f0f5e6c5df3d7596cc33 Step #5: Base64: Q0RGBfb5VqUAsl8NBAB3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwAAAAAAAAB8AAAAAAAAAAMw3YX+///z/9BU7wn/KUwMAwL7DA1fAAU= Step #5: MERGE-OUTER: attempt 22 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1526763224 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/b62ba7498b24599df994f0f5e6c5df3d7596cc33' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1269 processed earlier; will process 1650 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 31Mb Step #5: #8 pulse exec/s: 0 rss: 31Mb Step #5: #16 pulse exec/s: 0 rss: 31Mb Step #5: #32 pulse exec/s: 0 rss: 37Mb Step #5: #64 pulse exec/s: 64 rss: 781Mb Step #5: #128 pulse exec/s: 64 rss: 781Mb Step #5: #256 pulse exec/s: 128 rss: 781Mb Step #5: #512 pulse exec/s: 256 rss: 781Mb Step #5: ==108== ERROR: libFuzzer: out-of-memory (used: 3361Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x44,0xff,0x0,0xe9,0x1,0x7d,0x70,0x77,0x0,0x0,0x0,0xa,0x0,0x0,0x0,0x0,0x0,0x53,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x6f,0x52,0xac,0xd1,0x0,0x0,0x4,0x0,0xff,0x10,0x2,0x0, Step #5: CDF\005D\377\000\351\001}pw\000\000\000\012\000\000\000\000\000S\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 oR\254\321\000\000\004\000\377\020\002\000 Step #5: artifact_prefix='./'; Test unit written to ./oom-e65f813c2fe7c78d8d3a078d373e1d6e9a1cdad0 Step #5: Base64: Q0RGBUT/AOkBfXB3AAAACgAAAAAAU8DRAAAAAAAAAAD52Z8gAVLA0QAAAAAAAAAA+dmfIAFSwNEAAAAAAAAAAPnZnyABUsDRAAAAAAAAAAD52Z8gb1Ks0QAABAD/EAIA Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 23 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1530786377 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/e65f813c2fe7c78d8d3a078d373e1d6e9a1cdad0' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1802 processed earlier; will process 1117 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: #32 pulse exec/s: 0 rss: 30Mb Step #5: #64 pulse exec/s: 0 rss: 2114Mb Step #5: ==111== ERROR: libFuzzer: out-of-memory (used: 2114Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x1,0x9e,0x2f,0x6d,0x0,0x0,0x0,0x0,0xa,0x0,0x8f,0x81,0x4c,0x0,0x0,0x0,0x4,0xff,0x0,0x0,0x0,0xc3,0xff,0x0,0x80,0x0,0x0,0x0,0x3,0xff,0xff,0xff,0x15,0xa4,0x5,0xb0,0x4,0x0,0x0,0x0,0x4,0xff,0xff,0xff,0xff,0x1,0x0,0x0,0xc,0x0,0x0,0x0,0x2,0xff,0xff,0x7d,0x14,0xa4,0x4,0xb0,0x4,0x0,0x0,0x0,0x4,0xff,0xff,0xff,0xff,0x1,0x0,0x0,0xc,0x0,0x0,0x0,0x2,0xff,0xff,0x7d,0x14,0xa4,0x4,0xb0,0x4,0x0,0x0,0x0,0x4,0xff,0xff,0xff,0xff,0x0,0x0,0x0,0xc,0x0,0x0,0x0,0x2,0xff,0xff,0x0,0xff,0xfe,0x9a,0x0,0x15, Step #5: CDF\001\236/m\000\000\000\000\012\000\217\201L\000\000\000\004\377\000\000\000\303\377\000\200\000\000\000\003\377\377\377\025\244\005\260\004\000\000\000\004\377\377\377\377\001\000\000\014\000\000\000\002\377\377}\024\244\004\260\004\000\000\000\004\377\377\377\377\001\000\000\014\000\000\000\002\377\377}\024\244\004\260\004\000\000\000\004\377\377\377\377\000\000\000\014\000\000\000\002\377\377\000\377\376\232\000\025 Step #5: artifact_prefix='./'; Test unit written to ./oom-128a08f227c76f4e82d02b94ebd789b1d11b79eb Step #5: Base64: Q0RGAZ4vbQAAAAAKAI+BTAAAAAT/AAAAw/8AgAAAAAP///8VpAWwBAAAAAT/////AQAADAAAAAL//30UpASwBAAAAAT/////AQAADAAAAAL//30UpASwBAAAAAT/////AAAADAAAAAL//wD//poAFQ== Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 24 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1531801574 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/128a08f227c76f4e82d02b94ebd789b1d11b79eb' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1878 processed earlier; will process 1041 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 865Mb Step #5: #8 pulse exec/s: 0 rss: 865Mb Step #5: #16 pulse exec/s: 0 rss: 865Mb Step #5: #32 pulse exec/s: 32 rss: 2413Mb Step #5: ==114== ERROR: libFuzzer: out-of-memory (used: 2413Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0x44,0xff,0x0,0xe9,0x1,0x7d,0x70,0x77,0x0,0x0,0x0,0xa,0x0,0x0,0x0,0x0,0x0,0x53,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0x6f,0xd9,0x9f,0x20,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x6f,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x1,0x52,0xc0,0xd1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xf9,0xd9,0x9f,0x20,0x6f,0x52,0xac,0xd1,0x0,0x0,0x4,0x0,0xff,0x10,0x2,0x0, Step #5: CDF\005D\377\000\351\001}pw\000\000\000\012\000\000\000\000\000S\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371o\331\237 R\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 oR\300\321\000\000\000\000\000\000\000\000\371\331\237 \001R\300\321\000\000\000\000\000\000\000\000\371\331\237 oR\254\321\000\000\004\000\377\020\002\000 Step #5: artifact_prefix='./'; Test unit written to ./oom-94d64a60060f18bc0038684398b6dee48ab1fdb8 Step #5: Base64: Q0RGBUT/AOkBfXB3AAAACgAAAAAAU8DRAAAAAAAAAAD52Z8gAVLA0QAAAAAAAAAA+dmfIAFSwNEAAAAAAAAAAPlv2Z8gUsDRAAAAAAAAAAD52Z8gAVLA0QAAAAAAAAAA+dmfIG9SwNEAAAAAAAAAAPnZnyABUsDRAAAAAAAAAAD52Z8gb1Ks0QAABAD/EAIA Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 25 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1533819553 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/94d64a60060f18bc0038684398b6dee48ab1fdb8' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1921 processed earlier; will process 998 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 1042Mb Step #5: fuzz_open: /src/netcdf-c/build/libsrc/attr.c:68: size_t ncx_len_NC_attrV(nc_type, size_t): Assertion `"ncx_len_NC_attr bad type" == 0' failed. Step #5: ==117== ERROR: libFuzzer: deadly signal Step #5: #0 0x55661f70d064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x55661f68c0b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x55661f66f453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7f8c5d8b641f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7f8c5d6b000a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7f8c5d68f858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7f8c5d68f728 (/lib/x86_64-linux-gnu/libc.so.6+0x22728) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7f8c5d6a0fd5 in __assert_fail (/lib/x86_64-linux-gnu/libc.so.6+0x33fd5) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x55661f787881 in ncx_len_NC_attrV /src/netcdf-c/build/libsrc/attr.c:68:10 Step #5: #9 0x55661f787714 in new_x_NC_attr /src/netcdf-c/build/libsrc/attr.c:81:21 Step #5: #10 0x55661f76d1a0 in v1h_get_NC_attr /src/netcdf-c/libsrc/v1hpg.c:765:10 Step #5: #11 0x55661f76d1a0 in v1h_get_NC_attrarray /src/netcdf-c/libsrc/v1hpg.c:902:13 Step #5: #12 0x55661f76cdf9 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1549:11 Step #5: #13 0x55661f724d0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #14 0x55661f70df58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #15 0x55661f70e053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #16 0x55661f70d496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #17 0x55661f670960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #18 0x55661f679f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #19 0x55661f6614e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #20 0x55661f68c912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #21 0x7f8c5d691082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #22 0x55661f653dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0xa,0x0,0x5,0xa,0x0,0x0,0x0,0x0,0x0,0x0,0x6,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x0,0x0,0x0,0x0,0x0,0x0,0xed,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x0,0x0,0x0,0x0,0x0,0x0,0xed,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x7a,0xff,0xff,0xff,0xff,0x3d,0xff,0xff,0xff,0x9a,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0xd0,0x4c,0x1a,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x9a,0xff,0x0,0x0,0x0,0x0,0x0,0x7a,0xff,0xff,0xff,0xff,0x3d,0xff,0xff,0xff,0x9a,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0x4c,0xd0,0x4c,0x1a,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x9a,0x4c,0xa, Step #5: CDF\005\012\000\005\012\000\000\000\000\000\000\006\000\000\000\000\000\000\000\000\000\000\000\000\014\000\000\000\000\000\000\355\377\000\000\000\000\000\000\000\000\000\000\000\014\000\000\000\000\000\000\355\377\377\000\000\000\000\000z\377\377\377\377=\377\377\377\232LLLLLLLLLLLLLLLLL\320L\032\377\377\377\377\377\377\377\232\377\000\000\000\000\000z\377\377\377\377=\377\377\377\232LLLLLLLLLLLLLLLLL\320L\032\377\377\377\377\377\377\377\232L\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-d028bf791a02247366c778677a0c130721c343f3 Step #5: Base64: Q0RGBQoABQoAAAAAAAAGAAAAAAAAAAAAAAAADAAAAAAAAO3/AAAAAAAAAAAAAAAMAAAAAAAA7f//AAAAAAB6/////z3///+aTExMTExMTExMTExMTExMTEzQTBr/////////mv8AAAAAAHr/////Pf///5pMTExMTExMTExMTExMTExMTNBMGv////////+aTAo= Step #5: MERGE-OUTER: attempt 26 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1535217946 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/d028bf791a02247366c778677a0c130721c343f3' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 1928 processed earlier; will process 991 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 30Mb Step #5: #32 pulse exec/s: 0 rss: 558Mb Step #5: #64 pulse exec/s: 0 rss: 777Mb Step #5: #128 pulse exec/s: 0 rss: 777Mb Step #5: #256 pulse exec/s: 0 rss: 777Mb Step #5: munmap_chunk(): invalid pointer Step #5: ==121== ERROR: libFuzzer: deadly signal Step #5: #0 0x564d63db8064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x564d63d370b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x564d63d1a453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7fce2f88041f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7fce2f67a00a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7fce2f659858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7fce2f6c4265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7fce2f6cc2fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7fce2f6cc54b (/lib/x86_64-linux-gnu/libc.so.6+0x9554b) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x564d63de1dda in memio_close /src/netcdf-c/libsrc/memio.c:535:29 Step #5: #10 0x564d63dcfd3e in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1213:17 Step #5: #11 0x564d63db8f58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #12 0x564d63db9053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #13 0x564d63db8496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #14 0x564d63d1b960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #15 0x564d63d24f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #16 0x564d63d0c4e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #17 0x564d63d37912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #18 0x7fce2f65b082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #19 0x564d63cfedbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: 0x43,0x44,0x46,0x5,0xa,0x0,0x5,0xa,0x0,0x0,0x0,0x0,0x0,0x0,0x6,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0xc,0x20,0x0,0x0,0x0,0x0,0x0,0x7,0x1,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0xff,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x5,0x0,0x80,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x2d,0x2d,0x2e,0x2d,0x2d,0x33,0x34,0x46,0xd,0xa, Step #5: CDF\005\012\000\005\012\000\000\000\000\000\000\006\000\000\000\000\000\000\000\000\000\000\000\000\014 \000\000\000\000\000\007\001\000\000\000\000\000\000\000\000\000\000\000\005\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\000\005\000\200\000\000\000\000\000\000\000\000--.--34F\015\012 Step #5: artifact_prefix='./'; Test unit written to ./crash-fbf3538c5d4e23e943e774ff787ef93691b0bf44 Step #5: Base64: Q0RGBQoABQoAAAAAAAAGAAAAAAAAAAAAAAAADCAAAAAAAAcBAAAAAAAAAAAAAAAF//////////////////////////////////////////////8AAAAAAAAAAAAAAAAAAAAAAAAABQAAAAAAAAAAAAAAAAAAAAAAAAAFAAAAAAAAAAAAAAAAAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAAAAABQAAAAAAAAAAAAAAAAAAAAAAAAAFAAAAAAAAAAAAAAAAAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAAAAABQCAAAAAAAAAAAAtLS4tLTM0Rg0K Step #5: MERGE-OUTER: attempt 27 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1537569413 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/fbf3538c5d4e23e943e774ff787ef93691b0bf44' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2233 processed earlier; will process 686 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 230Mb Step #5: #8 pulse exec/s: 0 rss: 230Mb Step #5: #16 pulse exec/s: 0 rss: 230Mb Step #5: #32 pulse exec/s: 0 rss: 230Mb Step #5: #64 pulse exec/s: 0 rss: 230Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==125==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address (pc 0x7fe7739aa98c bp 0x56550dd39ea0 sp 0x7ffc1f6fb928 T125) Step #5: ==125==The signal is caused by a READ memory access. Step #5: ==125==Hint: this fault was caused by a dereference of a high value address (see register values below). Disassemble the provided pc to learn which register was used. Step #5: ==125== ERROR: libFuzzer: out-of-memory (used: 2094Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: Step #5: Step #5: artifact_prefix='./'; Test unit written to ./oom-da39a3ee5e6b4b0d3255bfef95601890afd80709 Step #5: Base64: Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 28 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1539583864 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/4131c4bad4eb7ec39dcfbd53e688842eb543e98d' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2322 processed earlier; will process 597 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 78Mb Step #5: free(): invalid next size (fast) Step #5: ==129== ERROR: libFuzzer: deadly signal Step #5: #0 0x56336c0ad064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x56336c02c0b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x56336c00f453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7f6c7786741f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7f6c7766100a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7f6c77640858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7f6c776ab265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7f6c776b32fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7f6c776b4bab (/lib/x86_64-linux-gnu/libc.so.6+0x96bab) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x56336c0c8507 in free_NC_dim /src/netcdf-c/libsrc/dim.c:29:2 Step #5: #10 0x56336c0c8507 in free_NC_dimarrayV0 /src/netcdf-c/libsrc/dim.c:176:4 Step #5: #11 0x56336c0c85e8 in free_NC_dimarrayV /src/netcdf-c/libsrc/dim.c:202:2 Step #5: #12 0x56336c0c5ab1 in free_NC3INFO /src/netcdf-c/libsrc/nc3internal.c:45:2 Step #5: #13 0x56336c0c5ab1 in NC3_close /src/netcdf-c/libsrc/nc3internal.c:1349:2 Step #5: #14 0x56336c0ae3a3 in nc_close /src/netcdf-c/libdispatch/dfile.c:1306:12 Step #5: #15 0x56336c0ad4a9 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:13:9 Step #5: #16 0x56336c010960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #17 0x56336c019f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #18 0x56336c0014e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #19 0x56336c02c912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #20 0x7f6c77642082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #21 0x56336bff3dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-f86ee492c7671c3cd3249ea47e28e4f45390156b Step #5: MERGE-OUTER: attempt 29 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1540434538 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/f86ee492c7671c3cd3249ea47e28e4f45390156b' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2330 processed earlier; will process 589 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 33Mb Step #5: free(): invalid next size (fast) Step #5: ==133== ERROR: libFuzzer: deadly signal Step #5: #0 0x55b99aa78064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x55b99a9f70b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x55b99a9da453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7fea2864f41f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7fea2844900a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7fea28428858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7fea28493265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7fea2849b2fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7fea2849cbab (/lib/x86_64-linux-gnu/libc.so.6+0x96bab) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x55b99aa93507 in free_NC_dim /src/netcdf-c/libsrc/dim.c:29:2 Step #5: #10 0x55b99aa93507 in free_NC_dimarrayV0 /src/netcdf-c/libsrc/dim.c:176:4 Step #5: #11 0x55b99aa935e8 in free_NC_dimarrayV /src/netcdf-c/libsrc/dim.c:202:2 Step #5: #12 0x55b99aad7dd9 in v1h_get_NC_dimarray /src/netcdf-c/libsrc/v1hpg.c:560:5 Step #5: #13 0x55b99aad7dd9 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1545:11 Step #5: #14 0x55b99aa8fd0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #15 0x55b99aa78f58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #16 0x55b99aa79053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #17 0x55b99aa78496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #18 0x55b99a9db960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #19 0x55b99a9e4f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #20 0x55b99a9cc4e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #21 0x55b99a9f7912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #22 0x7fea2842a082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #23 0x55b99a9bedbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-73e2a729caff7f30ffb6ecce8fd6853c972ceab9 Step #5: MERGE-OUTER: attempt 30 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1541354365 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/73e2a729caff7f30ffb6ecce8fd6853c972ceab9' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2347 processed earlier; will process 572 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 45Mb Step #5: #16 pulse exec/s: 0 rss: 1046Mb Step #5: #32 pulse exec/s: 0 rss: 1046Mb Step #5: #64 pulse exec/s: 32 rss: 1696Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==137==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000000000000 (pc 0x557d85e03714 bp 0x7ffff3efb940 sp 0x7ffff3efb8f0 T137) Step #5: ==137==The signal is caused by a READ memory access. Step #5: ==137==Hint: address points to the zero page. Step #5: #0 0x557d85e03714 in NC_hashmapadd /src/netcdf-c/libdispatch/nchashmap.c:201:15 Step #5: #1 0x557d85e29d17 in v1h_get_NC_dimarray /src/netcdf-c/libsrc/v1hpg.c:565:6 Step #5: #2 0x557d85e29d17 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1545:11 Step #5: #3 0x557d85de1d0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #4 0x557d85dcaf58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #5 0x557d85dcb053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #6 0x557d85dca496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #7 0x557d85d2d960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #8 0x557d85d36f30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #9 0x557d85d1e4e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #10 0x557d85d49912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #11 0x7f2cbcfc4082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #12 0x557d85d10dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: NC_hashmapadd--v1h_get_NC_dimarray--nc_get_NC Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/netcdf-c/libdispatch/nchashmap.c:201:15 in NC_hashmapadd Step #5: ==137==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-7fb19eab876d45bd5b21b89fcfb58a7c776283b0 Step #5: MERGE-OUTER: attempt 31 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1545872138 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/7fb19eab876d45bd5b21b89fcfb58a7c776283b0' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2467 processed earlier; will process 452 files now Step #5: #1 pulse exec/s: 0 rss: 1695Mb Step #5: #2 pulse exec/s: 0 rss: 1695Mb Step #5: #4 pulse exec/s: 0 rss: 1695Mb Step #5: #8 pulse exec/s: 0 rss: 1695Mb Step #5: ==141== ERROR: libFuzzer: out-of-memory (used: 4849Mb; limit: 2048Mb) Step #5: To change the out-of-memory limit use -rss_limit_mb= Step #5: Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./oom-e0c298ea44dcf07fdada9f776ee34f128b02ec97 Step #5: SUMMARY: libFuzzer: out-of-memory Step #5: MERGE-OUTER: attempt 32 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1547897730 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/e0c298ea44dcf07fdada9f776ee34f128b02ec97' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2476 processed earlier; will process 443 files now Step #5: #1 pulse exec/s: 0 rss: 29Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: #16 pulse exec/s: 0 rss: 62Mb Step #5: #32 pulse exec/s: 0 rss: 79Mb Step #5: #64 pulse exec/s: 0 rss: 2003Mb Step #5: #128 pulse exec/s: 128 rss: 2003Mb Step #5: free(): invalid pointer Step #5: ==144== ERROR: libFuzzer: deadly signal Step #5: #0 0x5590b82e3064 in __sanitizer_print_stack_trace /src/llvm-project/compiler-rt/lib/ubsan/ubsan_diag_standalone.cpp:31:3 Step #5: #1 0x5590b82620b8 in fuzzer::PrintStackTrace() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerUtil.cpp:210:5 Step #5: #2 0x5590b8245453 in fuzzer::Fuzzer::CrashCallback() /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:231:3 Step #5: #3 0x7efd76c3941f (/lib/x86_64-linux-gnu/libpthread.so.0+0x1441f) (BuildId: 9753720502573b97dbac595b61fd72c2df18e078) Step #5: #4 0x7efd76a3300a in raise (/lib/x86_64-linux-gnu/libc.so.6+0x4300a) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #5 0x7efd76a12858 in abort (/lib/x86_64-linux-gnu/libc.so.6+0x22858) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #6 0x7efd76a7d265 (/lib/x86_64-linux-gnu/libc.so.6+0x8d265) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #7 0x7efd76a852fb (/lib/x86_64-linux-gnu/libc.so.6+0x952fb) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #8 0x7efd76a86b2b (/lib/x86_64-linux-gnu/libc.so.6+0x96b2b) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #9 0x5590b82fe507 in free_NC_dim /src/netcdf-c/libsrc/dim.c:29:2 Step #5: #10 0x5590b82fe507 in free_NC_dimarrayV0 /src/netcdf-c/libsrc/dim.c:176:4 Step #5: #11 0x5590b82fe5e8 in free_NC_dimarrayV /src/netcdf-c/libsrc/dim.c:202:2 Step #5: #12 0x5590b82fbab1 in free_NC3INFO /src/netcdf-c/libsrc/nc3internal.c:45:2 Step #5: #13 0x5590b82fbab1 in NC3_close /src/netcdf-c/libsrc/nc3internal.c:1349:2 Step #5: #14 0x5590b82e43a3 in nc_close /src/netcdf-c/libdispatch/dfile.c:1306:12 Step #5: #15 0x5590b82e34a9 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:13:9 Step #5: #16 0x5590b8246960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #17 0x5590b824ff30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #18 0x5590b82374e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #19 0x5590b8262912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #20 0x7efd76a14082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #21 0x5590b8229dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: __sanitizer_print_stack_trace--fuzzer::PrintStackTrace()--fuzzer::Fuzzer::CrashCallback() Step #5: NOTE: libFuzzer has rudimentary signal handlers. Step #5: Combine libFuzzer with AddressSanitizer or similar for better crash reports. Step #5: SUMMARY: libFuzzer: deadly signal Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-5eff261007bccad41047e49e42356b92b5195f60 Step #5: MERGE-OUTER: attempt 33 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1550982689 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/5eff261007bccad41047e49e42356b92b5195f60' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2635 processed earlier; will process 284 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 31Mb Step #5: #16 pulse exec/s: 0 rss: 31Mb Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==148==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x555f3418c000 (pc 0x555f31ce8721 bp 0x7ffdea3aa9b0 sp 0x7ffdea3aa9b0 T148) Step #5: ==148==The signal is caused by a READ memory access. Step #5: #0 0x555f31ce8721 in get_ix_int64 /src/netcdf-c/build/libsrc/ncx.c:4055:9 Step #5: #1 0x555f31ce8721 in ncx_get_longlong_int /src/netcdf-c/build/libsrc/ncx.c:4160:5 Step #5: #2 0x555f31ce8721 in ncx_getn_longlong_int /src/netcdf-c/build/libsrc/ncx.c:18022:23 Step #5: #3 0x555f31d21686 in v1h_get_NC_var /src/netcdf-c/libsrc/v1hpg.c:1044:12 Step #5: #4 0x555f31d21686 in v1h_get_NC_vararray /src/netcdf-c/libsrc/v1hpg.c:1207:13 Step #5: #5 0x555f31d20e19 in nc_get_NC /src/netcdf-c/libsrc/v1hpg.c:1553:11 Step #5: #6 0x555f31cd8d0f in NC3_open /src/netcdf-c/libsrc/nc3internal.c:1198:11 Step #5: #7 0x555f31cc1f58 in NC_open /src/netcdf-c/libdispatch/dfile.c:2177:12 Step #5: #8 0x555f31cc2053 in nc_open_mem /src/netcdf-c/libdispatch/dfile.c:789:12 Step #5: #9 0x555f31cc1496 in LLVMFuzzerTestOneInput /src/netcdf-c/fuzz/fuzz_open.c:12:9 Step #5: #10 0x555f31c24960 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:614:13 Step #5: #11 0x555f31c2df30 in fuzzer::Fuzzer::CrashResistantMergeInternalStep(std::__Fuzzer::basic_string, std::__Fuzzer::allocator> const&, bool) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMerge.cpp:239:5 Step #5: #12 0x555f31c154e5 in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:887:8 Step #5: #13 0x555f31c40912 in main /src/llvm-project/compiler-rt/lib/fuzzer/FuzzerMain.cpp:20:10 Step #5: #14 0x7f4de420d082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) (BuildId: 5792732f783158c66fb4f3756458ca24e46e827d) Step #5: #15 0x555f31c07dbd in _start (out/libfuzzer-coverage-x86_64/fuzz_open+0x1adbd) Step #5: Step #5: DEDUP_TOKEN: get_ix_int64--ncx_get_longlong_int--ncx_getn_longlong_int Step #5: UndefinedBehaviorSanitizer can not provide additional info. Step #5: SUMMARY: UndefinedBehaviorSanitizer: SEGV /src/netcdf-c/build/libsrc/ncx.c:4055:9 in get_ix_int64 Step #5: ==148==ABORTING Step #5: MS: 0 ; base unit: 0000000000000000000000000000000000000000 Step #5: artifact_prefix='./'; Test unit written to ./crash-c2e0e2f2969eb87cacbd12f47025b72328a19582 Step #5: MERGE-OUTER: attempt 34 Step #5: INFO: Running with entropic power schedule (0xFF, 100). Step #5: INFO: Seed: 1551956029 Step #5: INFO: -max_len is not provided; libFuzzer will not generate inputs larger than 1048576 bytes Step #5: MERGE-INNER: using the control file '/tmp/libFuzzerTemp.Merge39.txt' Step #5: MERGE-INNER: '/corpus/fuzz_open/regressions/c2e0e2f2969eb87cacbd12f47025b72328a19582' caused a failure at the previous merge step Step #5: MERGE-INNER: 2919 total files; 2655 processed earlier; will process 264 files now Step #5: #1 pulse exec/s: 0 rss: 30Mb Step #5: #2 pulse exec/s: 0 rss: 30Mb Step #5: #4 pulse exec/s: 0 rss: 30Mb Step #5: #8 pulse exec/s: 0 rss: 30Mb Step #5: double free or corruption (out) Step #5: ==152== ERROR: libFuzzer: deadly signal Step #5: ==39== libFuzzer: run interrupted; exiting Step #5: ==152== libFuzzer: run interrupted; exiting Step #5: UndefinedBehaviorSanitizer:DEADLYSIGNAL Step #5: ==152==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f76c783c1fe bp 0x000000000030 sp 0x7ffc54047750 T152) Step #5: ==152==The signal is caused by a READ memory access. Step #5: ==152==Hint: address points to the zero page. Step #5: du: cannot access '/workspace/out/libfuzzer-coverage-x86_64/dumps/fuzz_open.*.profraw': No such file or directory Step #5: error: /workspace/out/libfuzzer-coverage-x86_64/dumps/*.profdata: No such file or directory Step #5: ******************************************************************************** Step #5: Code coverage report generation failed. Step #5: To reproduce, run: Step #5: python infra/helper.py build_image netcdf Step #5: python infra/helper.py build_fuzzers --sanitizer coverage netcdf Step #5: python infra/helper.py coverage netcdf Step #5: ******************************************************************************** Finished Step #5 ERROR ERROR: build step 5 "gcr.io/oss-fuzz-base/base-runner" failed: step exited with non-zero status: 1